{
  "CVE_data_type" : "CVE",
  "CVE_data_format" : "MITRE",
  "CVE_data_version" : "4.0",
  "CVE_data_numberOfCVEs" : "22898",
  "CVE_data_timestamp" : "2025-08-20T07:00Z",
  "CVE_Items" : [ {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0001",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://borelenzo.github.io/stuff/2025/02/15/CVE-2025-0001.html",
          "name" : "https://borelenzo.github.io/stuff/2025/02/15/CVE-2025-0001.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Abacus ERP is versions older than 2024.210.16036, 2023.205.15833, 2022.105.15542 are affected by an authenticated arbitrary file read vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T10:15Z",
    "lastModifiedDate" : "2025-02-17T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0014",
        "ASSIGNER" : "psirt@amd.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7037.html",
          "name" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-7037.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions on the AMD Ryzen(TM) AI installation folder could allow an attacker to achieve privilege escalation, potentially resulting in arbitrary code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-02T17:15Z",
    "lastModifiedDate" : "2025-04-02T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0015",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
          "name" : "https://developer.arm.com/Arm%20Security%20Center/Mali%20GPU%20Driver%20Vulnerabilities",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to make improper GPU processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r48p0 through r49p1, from r50p0 through r52p0; Arm 5th Gen GPU Architecture Kernel Driver: from r48p0 through r49p1, from r50p0 through r52p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-03T11:15Z",
    "lastModifiedDate" : "2025-02-03T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0020",
        "ASSIGNER" : "psirt@esri.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: “This CVE ID is Rejected and will not be used.  As the CNA of record ESRI has rejected this CVE as it is not a vulnerability”"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T08:15Z",
    "lastModifiedDate" : "2025-05-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0035",
        "ASSIGNER" : "psirt@amd.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9015.html",
          "name" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-9015.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unquoted search path within AMD Cloud Manageability Service can allow a local attacker to escalate privileges, potentially resulting in arbitrary code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T17:15Z",
    "lastModifiedDate" : "2025-05-13T19:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0036",
        "ASSIGNER" : "psirt@amd.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8011.html",
          "name" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8011.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In AMD Versal Adaptive SoC devices, the incorrect configuration of the SSS during runtime (post-boot) cryptographic operations could cause data to be incorrectly written to and read from invalid locations as well as returning incorrect cryptographic data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-10T00:15Z",
    "lastModifiedDate" : "2025-06-12T16:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0037",
        "ASSIGNER" : "psirt@amd.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8010.html",
          "name" : "https://www.amd.com/en/resources/product-security/bulletin/amd-sb-8010.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In AMD Versal Adaptive SoC devices, the lack of address validation when executing PLM runtime services through the PLM firmware can allow access to isolated or protected memory spaces, resulting in the loss of integrity and confidentiality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-10T00:15Z",
    "lastModifiedDate" : "2025-06-10T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0049",
        "ASSIGNER" : "security.reports@fortra.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.fortra.com/security/advisories/product-security/fi-2025-004",
          "name" : "https://www.fortra.com/security/advisories/product-security/fi-2025-004",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When a Web User without Create permission on subfolders attempts to upload a file to a non-existent directory, the error message includes the absolute server path which may allow Fuzzing for application mapping.\nThis issue affects GoAnywhere: before 7.8.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fortra:goanywhere_managed_file_transfer:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "7.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-28T21:15Z",
    "lastModifiedDate" : "2025-05-10T00:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0050",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110435/latest/",
          "name" : "https://developer.arm.com/documentation/110435/latest/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to make valid GPU processing operations, including via WebGL or WebGPU, to access a limited amount outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r0p0 through r49p2, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r19p0 through r49p2, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p2, from r50p0 through r53p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-07T12:15Z",
    "lastModifiedDate" : "2025-04-08T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0051",
        "ASSIGNER" : "psirt@purestorage.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html",
          "name" : "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation performed during the authentication process of FlashArray could lead to a system Denial of Service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-10T18:15Z",
    "lastModifiedDate" : "2025-06-10T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0052",
        "ASSIGNER" : "psirt@purestorage.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html",
          "name" : "https://support.purestorage.com/bundle/m_security_bulletins/page/Pure_Security/topics/concept/c_security_bulletins.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation performed during the authentication process of FlashBlade could lead to a system Denial of Service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-10T18:15Z",
    "lastModifiedDate" : "2025-06-10T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0053",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3536461",
          "name" : "https://me.sap.com/notes/3536461",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server for ABAP and ABAP Platform allows an attacker to gain unauthorized access to system information. By using a specific URL parameter, an unauthenticated attacker could retrieve details such as system configuration. This has a limited impact on the confidentiality of the application and may be leveraged to facilitate further attacks or exploits."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0054",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3526203",
          "name" : "https://me.sap.com/notes/3526203",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server Java does not sufficiently handle user input, resulting in a stored cross-site scripting vulnerability. The application allows attackers with basic user privileges to store a Javascript payload on the server, which could be later executed in the victim's web browser. With this the attacker might be able to read or modify information associated with the vulnerable web page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T01:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0055",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3472837",
          "name" : "https://me.sap.com/notes/3472837",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP GUI for Windows stores user input on the client PC to improve usability. Under very specific circumstances an attacker with administrative privileges or access to the victim?s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0056",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3502459",
          "name" : "https://me.sap.com/notes/3502459",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP GUI for Java saves user input on the client PC to improve usability. An attacker with administrative privileges or access to the victim?s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0057",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3514421",
          "name" : "https://me.sap.com/notes/3514421",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver AS JAVA (User Admin Application) is vulnerable to stored cross site scripting vulnerability. An attacker posing as an admin can upload a photo with malicious JS content. When a victim visits the vulnerable component, the attacker can read and modify information within the scope of victim's web browser."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0058",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3542698",
          "name" : "https://me.sap.com/notes/3542698",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In SAP Business Workflow and SAP Flexible Workflow, an authenticated attacker can manipulate a parameter in an otherwise legitimate resource request to view sensitive information that should otherwise be restricted. The attacker does not have the ability to modify the information or to make the information unavailable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0059",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3503138",
          "name" : "https://me.sap.com/notes/3503138",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Applications based on SAP GUI for HTML in SAP NetWeaver Application Server ABAP store user input in the local browser storage to improve usability. An attacker with administrative privileges or access to the victim?s user directory on the Operating System level would be able to read this data. Depending on the user input provided in transactions, the disclosed data could range from non-critical data to highly sensitive data, causing high impact on confidentiality of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0060",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3474398",
          "name" : "https://me.sap.com/notes/3474398",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP BusinessObjects Business Intelligence Platform allows an authenticated user with restricted access to inject malicious JS code which can read sensitive information from the server and send it to the attacker. The attacker could further use this information to impersonate as a high privileged user causing high impact on confidentiality and integrity of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0061",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3474398",
          "name" : "https://me.sap.com/notes/3474398",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP BusinessObjects Business Intelligence Platform allows an unauthenticated attacker to perform session hijacking over the network without any user interaction, due to an information disclosure vulnerability. Attacker can access and modify all the data of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0062",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3557459",
          "name" : "https://me.sap.com/notes/3557459",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP BusinessObjects Business Intelligence Platform allows an attacker to inject JavaScript code in Web Intelligence reports. This code is then executed in the victim's browser each time the vulnerable page is visited by the victim. On successful exploitation, an attacker could cause limited impact on confidentiality and integrity within the scope of victim?s browser. There is no impact on availability. This vulnerability occurs only when script/html execution is enabled by the administrator in Central Management Console."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-11T01:15Z",
    "lastModifiedDate" : "2025-03-11T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0063",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3550816",
          "name" : "https://me.sap.com/notes/3550816",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver AS ABAP and ABAP Platform does not check for authorization when a user executes some RFC function modules. This could lead to an attacker with basic user privileges to gain control over the data in Informix database, leading to complete compromise of confidentiality, integrity and availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0064",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-732"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3525794",
          "name" : "https://me.sap.com/notes/3525794",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Under specific conditions, the Central Management Console of the SAP BusinessObjects Business Intelligence platform allows an attacker with admin rights to generate or retrieve a secret passphrase, enabling them to impersonate any user in the system. This results in a high impact on confidentiality and integrity, with no impact on availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T01:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0065",
        "ASSIGNER" : "psirt@teamviewer.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1001/",
          "name" : "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/tv-2025-1001/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Argument Delimiters in the TeamViewer_service.exe component of TeamViewer Clients prior version 15.62 for Windows allows an attacker with local unprivileged access on a Windows system to elevate privileges via argument injection."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T11:15Z",
    "lastModifiedDate" : "2025-01-28T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0066",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-732"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3550708",
          "name" : "https://me.sap.com/notes/3550708",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Under certain conditions SAP NetWeaver AS for ABAP and ABAP Platform (Internet Communication Framework) allows an attacker to access restricted information due to weak access controls. This can have a significant impact on the confidentiality, integrity, and availability of an application"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0067",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3540108",
          "name" : "https://me.sap.com/notes/3540108",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to a missing authorization check on service endpoints in the SAP NetWeaver Application Server Java, an attacker with standard user role can create JCo connection entries, which are used for remote function calls from or to the application server. This could lead to low impact on confidentiality, integrity, and availability of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0068",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3550674",
          "name" : "https://me.sap.com/notes/3550674",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An obsolete functionality in SAP NetWeaver Application Server ABAP did not perform necessary authorization checks. Because of this, an authenticated attacker could obtain information that would otherwise be restricted. It has no impact on integrity or availability on the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0069",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3542533",
          "name" : "https://me.sap.com/notes/3542533",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to DLL injection vulnerability in SAPSetup, an attacker with either local user privileges or with access to a compromised corporate user?s Windows account could gain higher privileges. With this, he could move laterally within the network and further compromise the active directory of a company. This leads to high impact on confidentiality, integrity and availability of the Windows server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0070",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3537476",
          "name" : "https://me.sap.com/notes/3537476",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP NetWeaver Application Server for ABAP and ABAP Platform allows an authenticated attacker to obtain illegitimate access to the system by exploiting improper authentication checks, resulting in privilege escalation. On successful exploitation, this can result in potential security concerns. This results in a high impact on confidentiality, integrity, and availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T01:15Z",
    "lastModifiedDate" : "2025-01-14T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0071",
        "ASSIGNER" : "cna@sap.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://me.sap.com/notes/3558132",
          "name" : "https://me.sap.com/notes/3558132",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://url.sap/sapsecuritypatchday",
          "name" : "https://url.sap/sapsecuritypatchday",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SAP Web Dispatcher and Internet Communication Manager allow an attacker with administrative privileges to enable debugging trace mode with a specific parameter value. This exposes unencrypted passwords in the logs, causing a high impact on the confidentiality of the application. There is no impact on integrity or availability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-11T01:15Z",
    "lastModifiedDate" : "2025-03-11T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0072",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110465/latest/",
          "name" : "https://developer.arm.com/documentation/110465/latest/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.\n\nThis issue affects Valhall GPU Kernel Driver: from r29p0 through r49p3, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p3, from r50p0 through r53p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r41p0",
          "versionEndIncluding" : "r49p3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndIncluding" : "r53p0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r29p0",
          "versionEndIncluding" : "r49p3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndIncluding" : "r53p0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-02T10:15Z",
    "lastModifiedDate" : "2025-05-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0073",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110466/latest/",
          "name" : "https://developer.arm.com/documentation/110466/latest/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform improper GPU memory processing operations to gain access to already freed memory.This issue affects Valhall GPU Kernel Driver: from r53p0 before r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r53p0 before r54p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:r53p0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:r53p0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T11:15Z",
    "lastModifiedDate" : "2025-07-02T21:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0101",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.vde.com/en/advisories/VDE-2025-007",
          "name" : "https://cert.vde.com/en/advisories/VDE-2025-007",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A low privileged user can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes some functions to work unexpected or stop working at all. Both during runtime and after a restart."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-16T08:15Z",
    "lastModifiedDate" : "2025-04-16T13:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0103",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "name" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T03:15Z",
    "lastModifiedDate" : "2025-01-11T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0104",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "name" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in Palo Alto Networks Expedition enables attackers to execute malicious JavaScript code in the context of an authenticated Expedition user’s browser if that authenticated user clicks a malicious link that allows phishing attacks and could lead to Expedition browser-session theft."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T03:15Z",
    "lastModifiedDate" : "2025-01-11T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0105",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "name" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An arbitrary file deletion vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host filesystem."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T03:15Z",
    "lastModifiedDate" : "2025-01-11T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0106",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "name" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A wildcard expansion vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to enumerate files on the host filesystem."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T03:15Z",
    "lastModifiedDate" : "2025-01-11T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0107",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "name" : "https://security.paloaltonetworks.com/PAN-SA-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T03:15Z",
    "lastModifiedDate" : "2025-01-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0108",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/iSee857/CVE-2025-0108-PoC",
          "name" : "https://github.com/iSee857/CVE-2025-0108-PoC",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0108",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0108",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/",
          "name" : "https://slcyber.io/blog/nginx-apache-path-confusion-to-auth-bypass-in-pan-os/",
          "refsource" : "",
          "tags" : [ "Exploit", "Press/Media Coverage" ]
        }, {
          "url" : "https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/",
          "name" : "https://www.bleepingcomputer.com/news/security/palo-alto-networks-tags-new-firewall-bug-as-exploited-in-attacks/",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage", "Third Party Advisory" ]
        }, {
          "url" : "https://www.darkreading.com/remote-workforce/patch-now-cisa-researchers-warn-palo-alto-flaw-exploited-wild",
          "name" : "https://www.darkreading.com/remote-workforce/patch-now-cisa-researchers-warn-palo-alto-flaw-exploited-wild",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage", "Third Party Advisory" ]
        }, {
          "url" : "https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/",
          "name" : "https://www.securityweek.com/palo-alto-networks-confirms-exploitation-of-firewall-vulnerability/",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage", "Third Party Advisory" ]
        }, {
          "url" : "https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/",
          "name" : "https://www.theregister.com/2025/02/19/palo_alto_firewall_attack/",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authentication bypass in the Palo Alto Networks PAN-OS software enables an unauthenticated attacker with network access to the management web interface to bypass the authentication otherwise required by the PAN-OS management web interface and invoke certain PHP scripts. While invoking these PHP scripts does not enable remote code execution, it can negatively impact integrity and confidentiality of PAN-OS.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.2.0",
          "versionEndExcluding" : "11.2.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.1.0",
          "versionEndExcluding" : "10.1.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.2.0",
          "versionEndExcluding" : "10.2.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.2:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.1.0",
          "versionEndExcluding" : "11.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.4:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h22:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h23:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h20:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.10:h13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.11:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-06-27T20:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0109",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2024-0109",
          "name" : "https://security.paloaltonetworks.com/CVE-2024-0109",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unauthenticated file deletion vulnerability in the Palo Alto Networks PAN-OS management web interface enables an unauthenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files.\n\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-02-12T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0110",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0110",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0110",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A command injection vulnerability in the Palo Alto Networks PAN-OS OpenConfig plugin enables an authenticated administrator with the ability to make gNMI requests to the PAN-OS management web interface to bypass system restrictions and run arbitrary commands. The commands are run as the “__openconfig” user (which has the Device Administrator role) on the firewall.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 ."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-02-12T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0111",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-610"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0111",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0111",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated file read vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated attacker with network access to the management web interface to read files on the PAN-OS filesystem that are readable by the “nobody” user.\n\nYou can greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  best practices deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\n\n\nThis issue does not affect Cloud NGFW or Prisma Access software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.1.0",
          "versionEndExcluding" : "10.1.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.2.0",
          "versionEndExcluding" : "11.2.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.1.14:h8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.2.0",
          "versionEndExcluding" : "10.2.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.7:h21:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.8:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h19:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.9:h9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.2.10",
          "versionEndExcluding" : "10.2.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.12:h4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:10.2.13:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.0.0",
          "versionEndExcluding" : "11.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.1.6:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:paloaltonetworks:pan-os:11.2.4:h2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-02-21T14:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0112",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0112",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0112",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XDR agent and then perform malicious activity."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T00:15Z",
    "lastModifiedDate" : "2025-02-20T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0113",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0113",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0113",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. This may allow access to read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-04-09T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0114",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0114",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0114",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software enables an unauthenticated attacker to render the service unavailable by sending a large number of specially crafted packets over a period of time. This issue affects both the GlobalProtect portal and the GlobalProtect gateway.\n\nThis issue does not apply to Cloud NGFWs or Prisma Access software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T19:15Z",
    "lastModifiedDate" : "2025-03-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0115",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0115",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0115",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Palo Alto Networks PAN-OS software enables an authenticated admin on the PAN-OS CLI to read arbitrary files.\n\nThe attacker must have network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. You can greatly reduce the risk of this issue by restricting access to the management interface to only trusted users and internal IP addresses according to our recommended  critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW or Prisma Access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T19:15Z",
    "lastModifiedDate" : "2025-03-15T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0116",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0116",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0116",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) vulnerability in Palo Alto Networks PAN-OS software causes the firewall to unexpectedly reboot when processing a specially crafted LLDP frame sent by an unauthenticated adjacent attacker. Repeated attempts to initiate this condition causes the firewall to enter maintenance mode.\n\nThis issue does not apply to Cloud NGFWs or Prisma Access software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T19:15Z",
    "lastModifiedDate" : "2025-03-18T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0117",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0117",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0117",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reliance on untrusted input for a security decision in the GlobalProtect app on Windows devices potentially enables a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM.\n\nGlobalProtect App on macOS, Linux, iOS, Android, Chrome OS and GlobalProtect UWP App are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T19:15Z",
    "lastModifiedDate" : "2025-03-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0118",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0118",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0118",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Palo Alto Networks GlobalProtect app on Windows allows a remote attacker to run ActiveX controls within the context of an authenticated Windows user. This enables the attacker to run commands as if they are a legitimate authenticated user. However, to exploit this vulnerability, the authenticated user must navigate to a malicious page during the GlobalProtect SAML login process on a Windows device.\n\nThis issue does not apply to the GlobalProtect app on other (non-Windows) platforms."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.2.0",
          "versionEndExcluding" : "6.2.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.0.11",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.1.0",
          "versionEndExcluding" : "6.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.3.0",
          "versionEndExcluding" : "6.3.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-12T19:15Z",
    "lastModifiedDate" : "2025-06-27T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0119",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0119",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0119",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A command injection vulnerability in the Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to execute arbitrary OS commands with root privileges on the host operating system running Broker VM."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T18:15Z",
    "lastModifiedDate" : "2025-04-15T18:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0120",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0120",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0120",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability with a privilege management mechanism in the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM. However, execution requires that the local user can also successfully exploit a race condition, which makes this vulnerability difficult to exploit."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.3.0",
          "versionEndExcluding" : "6.3.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.0.12",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.1.0",
          "versionEndExcluding" : "6.2.7-1077",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-06-27T16:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0121",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0121",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0121",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A null pointer dereference vulnerability in the Palo Alto Networks Cortex® XDR agent on Windows devices allows a low-privileged local Windows user to crash the agent. Additionally, malware can use this vulnerability to perform malicious activity without Cortex XDR being able to detect it."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0122",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0122",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0122",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A denial-of-service (DoS) vulnerability in Palo Alto Networks Prisma® SD-WAN ION devices enables an unauthenticated attacker in a network adjacent to a Prisma SD-WAN ION device to disrupt the packet processing capabilities of the device by sending a burst of crafted packets to that device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0123",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0123",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0123",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Palo Alto Networks PAN-OS® software enables unlicensed administrators to view clear-text data captured using the  packet capture feature https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-admin/monitoring/take-packet-captures/take-a-custom-packet-capture  in decrypted HTTP/2 data streams traversing network interfaces on the firewall. HTTP/1.1 data streams are not impacted.\n\nIn normal conditions, decrypted packet captures are available to firewall administrators after they obtain and install a free Decryption Port Mirror license. The license requirement ensures that this feature can only be used after approved personnel purposefully activate the license. For more information, review how to  configure decryption port mirroring https://docs.paloaltonetworks.com/network-security/decryption/administration/monitoring-decryption/configure-decryption-port-mirroring .\n\nThe administrator must obtain network access to the management interface (web, SSH, console, or telnet) and successfully authenticate to exploit this issue. Risk of this issue can be greatly reduced by restricting access to the management interface to only trusted administrators and from only internal IP addresses according to our recommended  critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nCustomer firewall administrators do not have access to the packet capture feature in Cloud NGFW. This feature is available only to authorized Palo Alto Networks personnel permitted to perform troubleshooting.\n\nPrisma® Access is not impacted by this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T18:15Z",
    "lastModifiedDate" : "2025-04-15T18:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0124",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0124",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0124",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated file deletion vulnerability in the Palo Alto Networks PAN-OS® software enables an authenticated attacker with network access to the management web interface to delete certain files as the “nobody” user; this includes limited logs and configuration files but does not include system files.\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue affects Cloud NGFW. However, this issue does not affect Prisma® Access software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0125",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0125",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0125",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.\n\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 .\n\nThis issue does not affect Cloud NGFW and all Prisma® Access instances."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0126",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0126",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0126",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When configured using SAML, a session fixation vulnerability in the GlobalProtect™ login enables an attacker to impersonate a legitimate authorized user and perform actions as that GlobalProtect user. This requires the legitimate user to first click on a malicious link provided by the attacker.\n\nThe SAML login for the PAN-OS® management interface is not affected. Additionally, this issue does not affect Cloud NGFW and all Prisma® Access instances are proactively patched."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0127",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0127",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0127",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A command injection vulnerability in Palo Alto Networks PAN-OS® software enables an authenticated administrator to bypass system restrictions and run arbitrary commands as a root user. This issue is only applicable to PAN-OS VM-Series. This issue does not affect firewalls that are already deployed.\n\nCloud NGFW and Prisma® Access are not affected by this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0128",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0128",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0128",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A denial-of-service (DoS) vulnerability in the Simple Certificate Enrollment Protocol (SCEP) authentication feature of Palo Alto Networks PAN-OS® software enables an unauthenticated attacker to initiate system reboots using a maliciously crafted packet. Repeated attempts to initiate a reboot causes the firewall to enter maintenance mode.\n\nCloud NGFW is not affected by this vulnerability. Prisma® Access software is proactively patched and protected from this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T02:15Z",
    "lastModifiedDate" : "2025-04-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0129",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/PAN-SA-2025-0008",
          "name" : "https://security.paloaltonetworks.com/PAN-SA-2025-0008",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper exception check in Palo Alto Networks Prisma Access Browser allows a low privileged user to prevent Prisma Access Browser from applying it's Policy Rules. This enables the user to use Prisma Access Browser without any restrictions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T23:15Z",
    "lastModifiedDate" : "2025-06-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0130",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0130",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0130",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A missing exception check in Palo Alto Networks PAN-OS® software with the web proxy feature enabled allows an unauthenticated attacker to send a burst of maliciously crafted packets that causes the firewall to become unresponsive and eventually reboot. Repeated successful attempts to trigger this condition will cause the firewall to enter maintenance mode.\n\nThis issue does not affect Cloud NGFW or Prisma Access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T18:15Z",
    "lastModifiedDate" : "2025-05-14T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0131",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0131",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0131",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.opswat.com/docs/mdsdk/release-notes/cve-2025-0131",
          "name" : "https://www.opswat.com/docs/mdsdk/release-notes/cve-2025-0131",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect privilege management vulnerability in the OPSWAT MetaDefender Endpoint Security SDK used by the Palo Alto Networks GlobalProtect™ app on Windows devices allows a locally authenticated non-administrative Windows user to escalate their privileges to NT AUTHORITY\\SYSTEM. However, execution requires that the local user also successfully exploits a race condition, which makes this vulnerability difficult to exploit."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-15T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0132",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0132",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0132",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A missing authentication vulnerability in Palo Alto Networks Cortex XDR® Broker VM allows an unauthenticated user to disable certain internal services on the Broker VM. \n\nThe attacker must have network access to the Broker VM to exploit this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-14T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0133",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0133",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0133",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A reflected cross-site scripting (XSS) vulnerability in the GlobalProtect™ gateway and portal features of Palo Alto Networks PAN-OS® software enables execution of malicious JavaScript in the context of an authenticated Captive Portal user's browser when they click on a specially crafted link. The primary risk is phishing attacks that can lead to credential theft—particularly if you enabled Clientless VPN.\n\nThere is no availability impact to GlobalProtect features or GlobalProtect users. Attackers cannot use this vulnerability to tamper with or modify contents or configurations of the GlobalProtect portal or gateways. The integrity impact of this vulnerability is limited to enabling an attacker to create phishing and credential-stealing links that appear to be hosted on the GlobalProtect portal.\n\n\n\nFor GlobalProtect users with Clientless VPN enabled, there is a limited impact on confidentiality due to inherent risks of Clientless VPN that facilitate credential theft. You can read more about this risk in the informational bulletin  PAN-SA-2025-0005 https://security.paloaltonetworks.com/PAN-SA-2025-0005   https://security.paloaltonetworks.com/PAN-SA-2025-0005 . There is no impact to confidentiality for GlobalProtect users if you did not enable (or you disable) Clientless VPN."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-14T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0134",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0134",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0134",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A code injection vulnerability in the Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to execute arbitrary code with root privileges on the host operating system running Broker VM."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-14T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0135",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0135",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0135",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app.\n\nThe GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.2.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paloaltonetworks:globalprotect:*:*:*:*:*:macos:*:*",
          "versionStartIncluding" : "6.3.0",
          "versionEndExcluding" : "6.3.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-06-27T16:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0136",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0136",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0136",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Using the AES-128-CCM algorithm for IPSec on certain Palo Alto Networks PAN-OS® firewalls (PA-7500, PA-5400, PA-5400f, PA-3400, PA-1600, PA-1400, and PA-400 Series) leads to unencrypted data transfer to devices that are connected to the PAN-OS firewall through IPSec.\n\nThis issue does not affect Cloud NGFWs, Prisma® Access instances, or  PAN-OS VM-Series firewalls.\n\nNOTE: The AES-128-CCM encryption algorithm is not recommended for use."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-14T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0137",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0137",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0137",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper input neutralization vulnerability in the management web interface of the Palo Alto Networks PAN-OS® software enables a malicious authenticated read-write administrator to impersonate another legitimate authenticated PAN-OS administrator.\n\n\nThe attacker must have network access to the management web interface to exploit this issue. You greatly reduce the risk of this issue by restricting access to the management web interface to only trusted internal IP addresses according to our recommended  critical deployment guidelines https://live.paloaltonetworks.com/t5/community-blogs/tips-amp-tricks-how-to-secure-the-management-access-of-your-palo/ba-p/464431 ."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-14T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0138",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0138",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0138",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Web sessions in the web interface of Palo Alto Networks Prisma® Cloud Compute Edition do not expire when users are deleted, which makes Prisma Cloud Compute Edition susceptible to unauthorized access.\n\nCompute in Prisma Cloud Enterprise Edition is not affected by this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-14T19:15Z",
    "lastModifiedDate" : "2025-05-16T14:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0139",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0139",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0139",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect privilege assignment vulnerability in Palo Alto Networks Autonomous Digital Experience Manager allows a locally authenticated low privileged user on macOS endpoints to escalate their privileges to root."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-09T23:15Z",
    "lastModifiedDate" : "2025-07-09T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0140",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0140",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0140",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on macOS devices enables a locally authenticated non administrative user to disable the app even if the GlobalProtect app configuration would not normally permit them to do so.\n\nThe GlobalProtect app on Windows, Linux, iOS, Android, Chrome OS and GlobalProtect UWP app are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-09T23:15Z",
    "lastModifiedDate" : "2025-07-30T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0141",
        "ASSIGNER" : "psirt@paloaltonetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.paloaltonetworks.com/CVE-2025-0141",
          "name" : "https://security.paloaltonetworks.com/CVE-2025-0141",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect privilege assignment vulnerability in the Palo Alto Networks GlobalProtect™ App on enables a locally authenticated non administrative user to escalate their privileges to root on macOS and Linux or NT AUTHORITY\\SYSTEM on Windows.\n\nThe GlobalProtect app on iOS, Android, Chrome OS and GlobalProtect UWP app are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-09T23:15Z",
    "lastModifiedDate" : "2025-07-10T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0142",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25001/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25001/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cleartext storage of sensitive information in the Zoom Jenkins Marketplace plugin before version 1.4 may allow an authenticated user to conduct a disclosure of information via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T20:15Z",
    "lastModifiedDate" : "2025-01-30T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0143",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25002/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25002/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds write in the Zoom Workplace App for Linux before version 6.2.5 may allow an unauthorized user to conduct a denial of service via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.2.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.2.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.2.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T20:15Z",
    "lastModifiedDate" : "2025-07-31T19:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0144",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25003/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds write in some Zoom Workplace Apps may allow an authorized user to conduct a loss of integrity via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T20:15Z",
    "lastModifiedDate" : "2025-01-30T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0145",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25004/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted search path in the installer for some Zoom Workplace Apps for Windows may allow an authorized user to conduct an escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T20:15Z",
    "lastModifiedDate" : "2025-01-30T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0146",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25005/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Symlink following in the installer for Zoom Workplace App for macOS before 6.2.10 may allow an authenticated user to conduct a denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T20:15Z",
    "lastModifiedDate" : "2025-08-01T01:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0147",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25006/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25006/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Type confusion in the Zoom Workplace App for Linux before 6.2.10 may allow an authorized user to conduct an escalation of privilege via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:video_software_development_kit:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T20:15Z",
    "lastModifiedDate" : "2025-08-01T01:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0148",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25007/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25007/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing password field masking in the Zoom Jenkins Marketplace plugin before version 1.6 may allow an unauthenticated user to conduct a disclosure of information via adjacent network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-03T23:15Z",
    "lastModifiedDate" : "2025-02-03T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0149",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25008/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25008/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient verification of data authenticity in some Zoom Workplace Apps may allow an unprivileged user to conduct a denial of service via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_desktop:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms_controller:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms:*:*:*:*:*:android:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:rooms:*:*:*:*:*:ipados:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "6.1.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace_virtual_desktop_infrastructure:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "6.1.16",
          "versionEndExcluding" : "6.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-11T17:16Z",
    "lastModifiedDate" : "2025-08-19T17:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0150",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25009/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25009/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect behavior order in some Zoom Workplace Apps for iOS before version 6.3.0 may allow an authenticated user to conduct a denial of service via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:meeting_software_development_kit:*:*:*:*:*:iphone_os:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zoom:workplace:*:*:*:*:*:iphone_os:*:*",
          "versionEndExcluding" : "6.3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-11T18:15Z",
    "lastModifiedDate" : "2025-08-01T14:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0151",
        "ASSIGNER" : "security@zoom.us"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25010/",
          "name" : "https://www.zoom.com/en/trust/security-bulletin/zsb-25010/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in some Zoom Workplace Apps may allow an authenticated user to conduct an escalation of privilege via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T18:15Z",
    "lastModifiedDate" : "2025-03-11T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0154",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-644"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7229880",
          "name" : "https://www.ibm.com/support/pages/node/7229880",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM TXSeries for Multiplatforms 9.1 and 11.1 could disclose sensitive information to a remote attacker due to improper neutralization of HTTP headers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:txseries_for_multiplatforms:9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:txseries_for_multiplatforms:11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-02T16:17Z",
    "lastModifiedDate" : "2025-07-15T19:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0158",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7182693",
          "name" : "https://www.ibm.com/support/pages/node/7182693",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM EntireX 11.1 could allow a local user to cause a denial of service due to an unhandled error and fault isolation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T21:15Z",
    "lastModifiedDate" : "2025-07-08T20:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0159",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          }, {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7184182",
          "name" : "https://www.ibm.com/support/pages/node/7184182",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1) could allow a remote attacker to bypass RPCAdapter endpoint authentication by sending a specifically crafted HTTP request."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.5",
          "versionEndExcluding" : "8.5.0.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.5.2.0",
          "versionEndIncluding" : "8.5.2.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.6.0.0",
          "versionEndExcluding" : "8.6.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.7.0.0",
          "versionEndExcluding" : "8.7.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-28T19:15Z",
    "lastModifiedDate" : "2025-08-18T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0160",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-114"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7184182",
          "name" : "https://www.ibm.com/support/pages/node/7184182",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM FlashSystem (IBM Storage Virtualize (8.5.0.0 through 8.5.0.13, 8.5.1.0, 8.5.2.0 through 8.5.2.3, 8.5.3.0 through 8.5.3.1, 8.5.4.0, 8.6.0.0 through 8.6.0.5, 8.6.1.0, 8.6.2.0 through 8.6.2.1, 8.6.3.0, 8.7.0.0 through 8.7.0.2, 8.7.1.0, 8.7.2.0 through 8.7.2.1)  could allow a remote attacker with access to the system to execute arbitrary Java code due to improper restrictions in the RPCAdapter service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.5",
          "versionEndExcluding" : "8.5.0.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.5.2.0",
          "versionEndIncluding" : "8.5.2.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.6.0.0",
          "versionEndExcluding" : "8.6.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.7.0.0",
          "versionEndExcluding" : "8.7.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T19:15Z",
    "lastModifiedDate" : "2025-08-18T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0161",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7183788",
          "name" : "https://www.ibm.com/support/pages/node/7183788",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Security Verify Access Appliance 10.0.0.0 through 10.0.0.9 and 11.0.0.0 could allow a local user to execute arbitrary code due to improper restrictions on code generation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndIncluding" : "10.0.0.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_access:11.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T16:15Z",
    "lastModifiedDate" : "2025-08-08T19:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0162",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7185096",
          "name" : "https://www.ibm.com/support/pages/node/7185096",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Aspera Shares 1.9.9 through 1.10.0 PL7 is vulnerable to an XML external entity injection (XXE) attack when processing XML data. A remote authenticated attacker could exploit this vulnerability to expose sensitive information or consume memory resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.9.9",
          "versionEndExcluding" : "1.10.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:aspera_shares:1.10.0:patch_level6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-03-07T17:15Z",
    "lastModifiedDate" : "2025-03-13T02:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0163",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-204"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7236314",
          "name" : "https://www.ibm.com/support/pages/node/7236314",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Security Verify Access Appliance and Docker 10.0 through 10.0.8 could allow a remote attacker to enumerate usernames due to an observable response discrepancy of disabled accounts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_access:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndExcluding" : "10.0.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_access_docker:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndExcluding" : "10.0.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-11T15:15Z",
    "lastModifiedDate" : "2025-08-13T14:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0167",
        "ASSIGNER" : "cve@curl.se"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://curl.se/docs/CVE-2025-0167.html",
          "name" : "www",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://curl.se/docs/CVE-2025-0167.json",
          "name" : "json",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://hackerone.com/reports/2917232",
          "name" : "issue",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://curl.se/docs/CVE-2025-0167.html",
          "name" : "https://curl.se/docs/CVE-2025-0167.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250306-0008/",
          "name" : "https://security.netapp.com/advisory/ntap-20250306-0008/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When asked to use a `.netrc` file for credentials **and** to follow HTTP\nredirects, curl could leak the password used for the first host to the\nfollowed-to host under certain circumstances.\n\nThis flaw only manifests itself if the netrc file has a `default` entry that\nomits both login and password. A rare circumstance."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.76.0",
          "versionEndExcluding" : "8.12.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:element_software:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap_tools:9:*:*:*:*:vmware_vsphere:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h610c_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h610c:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h610s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h610s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h615c_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h615c:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T10:15Z",
    "lastModifiedDate" : "2025-07-30T19:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0168",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/UnrealdDei/cve/blob/main/sql11.md",
          "name" : "https://github.com/UnrealdDei/cve/blob/main/sql11.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.289917",
          "name" : "VDB-289917 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.289917",
          "name" : "VDB-289917 | code-projects Job Recruitment _feedback_system.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473107",
          "name" : "Submit #473107 | code-projects job-recruitment-php  v1.0 Sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. This affects an unknown part of the file /_parse/_feedback_system.php. The manipulation of the argument person leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-01T14:15Z",
    "lastModifiedDate" : "2025-02-25T21:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0169",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/dwt-listing-directory-listing-wordpress-theme/21976132",
          "name" : "https://themeforest.net/item/dwt-listing-directory-listing-wordpress-theme/21976132",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/be0c29a3-0b78-4259-a514-c3674d9d5d55?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/be0c29a3-0b78-4259-a514-c3674d9d5d55?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The DWT - Directory & Listing WordPress Theme is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 3.3.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:scriptsbundle:dwt_listing:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.3.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-08T23:15Z",
    "lastModifiedDate" : "2025-02-11T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0170",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://scriptsbundle.gitbook.io/dwt-directory-and-listing-wordpress-theme",
          "name" : "https://scriptsbundle.gitbook.io/dwt-directory-and-listing-wordpress-theme",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d607e7c0-7812-4c77-a763-6095677b3525?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d607e7c0-7812-4c77-a763-6095677b3525?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The DWT - Directory & Listing WordPress Theme is vulnerable to Reflected Cross-Site Scripting in versions up to, and including, 3.3.3 due to insufficient input sanitization and output escaping on the 'sort_by' and 'token' parameters. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-16T02:15Z",
    "lastModifiedDate" : "2025-01-16T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0171",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Sinon2003/cve/blob/main/sql_inject1.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/sql_inject1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Sinon2003/cve/blob/main/sql_inject1.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/sql_inject1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.289938",
          "name" : "VDB-289938 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.289938",
          "name" : "VDB-289938 | code-projects Chat System deleteuser.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473143",
          "name" : "Submit #473143 | Code-projects Chat System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in code-projects Chat System 1.0. Affected is an unknown function of the file /admin/deleteuser.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:chat_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-02T15:15Z",
    "lastModifiedDate" : "2025-04-03T14:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0172",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Sinon2003/cve/blob/main/chatsystem/sql_inject2.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/chatsystem/sql_inject2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Sinon2003/cve/blob/main/chatsystem/sql_inject2.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/chatsystem/sql_inject2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.289939",
          "name" : "VDB-289939 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.289939",
          "name" : "VDB-289939 | code-projects Chat System deleteroom.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473153",
          "name" : "Submit #473153 | Code-projects Chat System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Chat System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/deleteroom.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:chat_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-02T16:15Z",
    "lastModifiedDate" : "2025-04-03T14:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0173",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/listlonely/cve/blob/main/sql.md",
          "name" : "https://github.com/listlonely/cve/blob/main/sql.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.289940",
          "name" : "VDB-289940 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.289940",
          "name" : "VDB-289940 | SourceCodester Online Eyewear Shop view_order.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473163",
          "name" : "Submit #473163 | sourcecodester Online Eyewear Shop Website v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Online Eyewear Shop 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /orders/view_order.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:oretnom23:online_eyewear_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-02T18:15Z",
    "lastModifiedDate" : "2025-02-10T14:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0174",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/ca3f96ac0ec34bb7c1dd4bfd180f11bb",
          "name" : "https://gist.github.com/Masamuneee/ca3f96ac0ec34bb7c1dd4bfd180f11bb",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290103",
          "name" : "VDB-290103 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290103",
          "name" : "VDB-290103 | code-projects Point of Sales and Inventory Management System Parameter search_result2.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473330",
          "name" : "Submit #473330 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been classified as critical. This affects an unknown part of the file /user/search_result2.php of the component Parameter Handler. The manipulation of the argument search leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T01:15Z",
    "lastModifiedDate" : "2025-02-25T22:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0175",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/fc65dafa7237cc66a18ef6005075c31b",
          "name" : "https://gist.github.com/th4s1s/fc65dafa7237cc66a18ef6005075c31b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290104",
          "name" : "VDB-290104 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290104",
          "name" : "VDB-290104 | code-projects Online Shop view.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473333",
          "name" : "Submit #473333 | code-projects Online Shop IN PHP, CSS, JavaScript, AND MYSQL 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Shop 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /view.php. The manipulation of the argument name/details leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:online_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-03T01:15Z",
    "lastModifiedDate" : "2025-02-25T22:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0176",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
          "name" : "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
          "name" : "https://gist.github.com/Masamuneee/9c539b89dad40033a5037b744e394ae0",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290105",
          "name" : "VDB-290105 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290105",
          "name" : "VDB-290105 | code-projects Point of Sales and Inventory Management System add_cart.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473347",
          "name" : "Submit #473347 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file /user/add_cart.php. The manipulation of the argument id/qty leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T02:15Z",
    "lastModifiedDate" : "2025-04-03T14:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0177",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/javo-directory-wordpress-theme/8390513#item-description__update-history",
          "name" : "https://themeforest.net/item/javo-directory-wordpress-theme/8390513#item-description__update-history",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d636768-37b4-4343-9028-30e7b1f997f2?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7d636768-37b4-4343-9028-30e7b1f997f2?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Javo Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.0.0.080. This is due to the plugin allowing users who are registering new accounts to set their own role. This makes it possible for unauthenticated attackers to gain elevated privileges by creating an account with the administrator role."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:javothemes:javo_core:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.0.0.266",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-08T09:15Z",
    "lastModifiedDate" : "2025-03-13T13:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0178",
        "ASSIGNER" : "security@watchguard.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003",
          "name" : "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00003",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Input Validation vulnerability in WatchGuard Fireware OS allows an attacker to manipulate the value of the HTTP Host header in requests sent to the Web UI. An attacker could exploit this vulnerability to redirect users to malicious websites, poison the web cache, or inject malicious JavaScript into responses sent by the Web UI.\nThis issue affects Fireware OS: from 12.0 up to and including 12.11."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T14:15Z",
    "lastModifiedDate" : "2025-02-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0180",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331",
          "name" : "https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7140a6e-a528-428e-850e-5e4a481c5d7d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d7140a6e-a528-428e-850e-5e4a481c5d7d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 3.3. This is due to the plugin not properly restricting what user meta can be updated during profile registration. This makes it possible for unauthenticated attackers to register on the site as an administrator."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T07:15Z",
    "lastModifiedDate" : "2025-02-11T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0181",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331",
          "name" : "https://themeforest.net/item/food-bakery-restaurant-bakery-responsive-wordpress-theme/18970331",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d722ec8d-bfca-4da1-8eb0-8d33735c5e44?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d722ec8d-bfca-4da1-8eb0-8d33735c5e44?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Foodbakery plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 4.7. This is due to the plugin not properly validating a user's identity prior to setting the current user and their authentication cookie. This makes it possible for unauthenticated attackers to gain access to a target user's (e.g. administrators) account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T07:15Z",
    "lastModifiedDate" : "2025-02-11T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0182",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/969b8056-b66c-4d70-8f77-04c1cbdc1d1a",
          "name" : "https://huntr.com/bounties/969b8056-b66c-4d70-8f77-04c1cbdc1d1a",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in danswer-ai/danswer version 0.9.0 allows for denial of service through memory exhaustion. The issue arises from the use of a vulnerable version of the starlette package (<=0.49) via fastapi, which was patched in fastapi version 0.115.3. The vulnerability can be exploited by sending multiple requests to the /auth/saml/callback endpoint, leading to uncontrolled memory consumption and eventual denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-20T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0183",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/53bced90-64a9-4ca2-8f2f-282c4ce84d1f",
          "name" : "https://huntr.com/bounties/53bced90-64a9-4ca2-8f2f-282c4ce84d1f",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored cross-site scripting (XSS) vulnerability exists in the Latex Proof-Reading Module of binary-husky/gpt_academic version 3.9.0. This vulnerability allows an attacker to inject malicious scripts into the `debug_log.html` file generated by the module. When an admin visits this debug report, the injected scripts can execute, potentially leading to unauthorized actions and data access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:binary-husky:gpt_academic:3.90:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-08-01T01:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0184",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/langgenius/dify/commit/c135ec4b08d946a1a1d3a198a1d72c1ccf47250f",
          "name" : "https://github.com/langgenius/dify/commit/c135ec4b08d946a1a1d3a198a1d72c1ccf47250f",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/a7eac4ae-5d5e-4ac1-894b-7a8cce5cba9b",
          "name" : "https://huntr.com/bounties/a7eac4ae-5d5e-4ac1-894b-7a8cce5cba9b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Server-Side Request Forgery (SSRF) vulnerability was identified in langgenius/dify version 0.10.2. The vulnerability occurs in the 'Create Knowledge' section when uploading DOCX files. If an external relationship exists in the DOCX file, the reltype value is requested as a URL using the 'requests' module instead of the 'ssrf_proxy', leading to an SSRF vulnerability. This issue was fixed in version 0.11.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:langgenius:dify:*:*:*:*:*:node.js:*:*",
          "versionEndExcluding" : "0.11.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-07-15T15:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0185",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/7d9eb9b2-7b86-45ed-89bd-276c1350db7e",
          "name" : "https://huntr.com/bounties/7d9eb9b2-7b86-45ed-89bd-276c1350db7e",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://huntr.com/bounties/7d9eb9b2-7b86-45ed-89bd-276c1350db7e",
          "name" : "https://huntr.com/bounties/7d9eb9b2-7b86-45ed-89bd-276c1350db7e",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Dify Tools' Vanna module of the langgenius/dify repository allows for a Pandas Query Injection in the latest version. The vulnerability occurs in the function `vn.get_training_plan_generic(df_information_schema)`, which does not properly sanitize user inputs before executing queries using the Pandas library. This can potentially lead to Remote Code Execution (RCE) if exploited."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dify:dify:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-27T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0187",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/77f3ed54-9e1c-4d9f-948f-ee6f82e2fe24",
          "name" : "https://huntr.com/bounties/77f3ed54-9e1c-4d9f-948f-ee6f82e2fe24",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) vulnerability was discovered in the file upload feature of gradio-app/gradio version 0.39.1. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. By sending a payload with an excessively large filename, the server becomes overwhelmed and unresponsive, leading to unavailability for legitimate users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gradio_project:gradio:0.39.1:*:*:*:*:python:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-08-01T18:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0188",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/879d2470-eca5-49c0-b3d1-57469cfff412",
          "name" : "https://huntr.com/bounties/879d2470-eca5-49c0-b3d1-57469cfff412",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Server-Side Request Forgery (SSRF) vulnerability was discovered in gaizhenbiao/chuanhuchatgpt version 20240914. The vulnerability allows an attacker to construct a response link by saving the response in a folder named after the SHA-1 hash of the target URL. This enables the attacker to access the response directly, potentially leading to unauthorized access to internal systems, data theft, service disruption, or further attacks such as port scanning and accessing metadata endpoints."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240914:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-07-09T18:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0189",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e",
          "name" : "https://huntr.com/bounties/e4c9bf41-72cf-4d04-baaf-8f12b5b7926e",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In version 3.25.0 of aimhubio/aim, the tracking server is vulnerable to a denial of service attack. The server overrides the maximum size for websocket messages, allowing very large images to be tracked. This causes the server to become unresponsive to other requests while processing the large image, leading to a denial of service condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-28T14:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0190",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70",
          "name" : "https://huntr.com/bounties/38d151f1-abb4-443a-86b0-6c26f0c6cb70",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In version 3.25.0 of aimhubio/aim, a denial of service vulnerability exists. By tracking a large number of `Text` objects and then querying them simultaneously through the web API, the Aim web server becomes unresponsive to other requests for an extended period while processing and returning these objects. This vulnerability can be exploited repeatedly, leading to a complete denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:aimstack:aim:3.25.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-28T14:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0191",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/c89a1dfd-a733-41b3-af20-6ef6024361eb",
          "name" : "https://huntr.com/bounties/c89a1dfd-a733-41b3-af20-6ef6024361eb",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) vulnerability exists in the file upload feature of gaizhenbiao/chuanhuchatgpt version 20240914. The vulnerability is due to improper handling of form-data with a large filename in the file upload request. By sending a payload with an excessively large filename, the server becomes overwhelmed and unresponsive, leading to unavailability for legitimate users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gaizhenbiao:chuanhuchatgpt:20240914:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-07-09T18:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0192",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/5f82c722-b674-456a-8691-a6565bf90e39",
          "name" : "https://huntr.com/bounties/5f82c722-b674-456a-8691-a6565bf90e39",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability exists in the latest version of wandb/openui. The vulnerability is present in the edit HTML functionality, where an attacker can inject malicious scripts. When the modified HTML is shared with another user, the XSS payload executes, potentially leading to the theft of user prompt history and other sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-20T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0193",
        "ASSIGNER" : "psirt@moxa.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series",
          "name" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-247733-cve-2025-0193-stored-cross-site-scripting-(xss)-vulnerability-in-the-mgate-5121-5122-5123-series",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability exists in the MGate 5121/5122/5123 Series firmware version v1.0 because of insufficient sanitization and encoding of user input in the \"Login Message\" functionality. An authenticated attacker with administrative access can exploit this vulnerability to inject malicious scripts that are continuously stored on the device. These scripts are executed when other users access the login page, potentially resulting in unauthorized actions or other impacts, depending on the user's privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-01-15T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0194",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/#possible-access-token-exposure-in-gitlab-logs",
          "name" : "https://about.gitlab.com/releases/2025/01/08/patch-release-gitlab-17-7-1-released/#possible-access-token-exposure-in-gitlab-logs",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/489459",
          "name" : "GitLab Issue #489459",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in GitLab CE/EE affecting all versions starting from 17.4 prior to 17.5.5, starting from 17.6 prior to 17.6.3, and starting from 17.7 prior to 17.7.1. Under certain conditions, access tokens may have been logged when API requests were made in a specific manner."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.4.0",
          "versionEndExcluding" : "17.5.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.6.0",
          "versionEndExcluding" : "17.6.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.4.0",
          "versionEndExcluding" : "17.5.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.6.0",
          "versionEndExcluding" : "17.6.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-08T20:15Z",
    "lastModifiedDate" : "2025-07-11T20:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0195",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/1ac717728823d58ef365a418c8f39810",
          "name" : "https://gist.github.com/Masamuneee/1ac717728823d58ef365a418c8f39810",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290132",
          "name" : "VDB-290132 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290132",
          "name" : "VDB-290132 | code-projects Point of Sales and Inventory Management System del_product.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473349",
          "name" : "Submit #473349 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /user/del_product.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T18:15Z",
    "lastModifiedDate" : "2025-02-25T22:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0196",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/13b0a6384f0c07e8db462df9cb18fd47",
          "name" : "https://gist.github.com/Masamuneee/13b0a6384f0c07e8db462df9cb18fd47",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290133",
          "name" : "VDB-290133 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290133",
          "name" : "VDB-290133 | code-projects Point of Sales and Inventory Management System plist.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473350",
          "name" : "Submit #473350 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Point of Sales and Inventory Management System 1.0. This affects an unknown part of the file /user/plist.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T19:15Z",
    "lastModifiedDate" : "2025-02-25T22:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0197",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/07a787e5a4599954c178baf90eeb553c",
          "name" : "https://gist.github.com/Masamuneee/07a787e5a4599954c178baf90eeb553c",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290134",
          "name" : "VDB-290134 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290134",
          "name" : "VDB-290134 | code-projects Point of Sales and Inventory Management System search.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473362",
          "name" : "Submit #473362 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Point of Sales and Inventory Management System 1.0. This vulnerability affects unknown code of the file /user/search.php. The manipulation of the argument name leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T20:15Z",
    "lastModifiedDate" : "2025-02-25T22:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0198",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/86580188bf42580c0ae70ae4d247e6df",
          "name" : "https://gist.github.com/Masamuneee/86580188bf42580c0ae70ae4d247e6df",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290135",
          "name" : "VDB-290135 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290135",
          "name" : "VDB-290135 | code-projects Point of Sales and Inventory Management System search_result.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473383",
          "name" : "Submit #473383 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in code-projects Point of Sales and Inventory Management System 1.0. This issue affects some unknown processing of the file /user/search_result.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T21:15Z",
    "lastModifiedDate" : "2025-02-25T22:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0199",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/eff0a0865d54305faa78624e63172a92",
          "name" : "https://gist.github.com/Masamuneee/eff0a0865d54305faa78624e63172a92",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290136",
          "name" : "VDB-290136 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290136",
          "name" : "VDB-290136 | code-projects Point of Sales and Inventory Management System minus_cart.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473384",
          "name" : "Submit #473384 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in code-projects Point of Sales and Inventory Management System 1.0. Affected is an unknown function of the file /user/minus_cart.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-03T23:15Z",
    "lastModifiedDate" : "2025-02-25T22:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0200",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/f238db57d8b1947d000cadf634a8387e",
          "name" : "https://gist.github.com/Masamuneee/f238db57d8b1947d000cadf634a8387e",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290137",
          "name" : "VDB-290137 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290137",
          "name" : "VDB-290137 | code-projects Point of Sales and Inventory Management System search_num.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473386",
          "name" : "Submit #473386 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /user/search_num.php. The manipulation of the argument search leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-04T03:15Z",
    "lastModifiedDate" : "2025-02-25T22:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0201",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Masamuneee/645d20dd1dc6389dd47a7fae0bb2cefa",
          "name" : "https://gist.github.com/Masamuneee/645d20dd1dc6389dd47a7fae0bb2cefa",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290138",
          "name" : "VDB-290138 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290138",
          "name" : "VDB-290138 | code-projects Point of Sales and Inventory Management System update_account.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473418",
          "name" : "Submit #473418 | code-projects POS(point of sales) and Inventory System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Point of Sales and Inventory Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /user/update_account.php. The manipulation of the argument username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:point_of_sales_and_inventory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-04T04:15Z",
    "lastModifiedDate" : "2025-02-25T22:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0202",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.290139",
          "name" : "VDB-290139 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290139",
          "name" : "VDB-290139 | TCS BaNCS REPORTS_SHOW_FILE.jsp file inclusion",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.469455",
          "name" : "Submit #469455 | TCS BaNCS Version 10 Local File Inclusion Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TCS BaNCS 10. It has been classified as problematic. This affects an unknown part of the file /REPORTS/REPORTS_SHOW_FILE.jsp. The manipulation of the argument FilePath leads to file inclusion. The real existence of this vulnerability is still doubted at the moment."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-04T05:15Z",
    "lastModifiedDate" : "2025-01-22T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0203",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/e8488d7e35d789581979f3b7e4c48b1f",
          "name" : "https://gist.github.com/th4s1s/e8488d7e35d789581979f3b7e4c48b1f",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290140",
          "name" : "VDB-290140 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290140",
          "name" : "VDB-290140 | code-projects Student Management System DbFunction.php showSubject1 sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.473410",
          "name" : "Submit #473410 | code-projects Student Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Student Management System 1.0. It has been declared as critical. This vulnerability affects the function showSubject1 of the file /config/DbFunction.php. The manipulation of the argument sid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:student_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T07:15Z",
    "lastModifiedDate" : "2025-01-22T15:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0204",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/6f0b3fcf85455238b4316d0fda7d489e",
          "name" : "https://gist.github.com/th4s1s/6f0b3fcf85455238b4316d0fda7d489e",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290141",
          "name" : "VDB-290141 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290141",
          "name" : "VDB-290141 | code-projects Online Shoe Store details.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474031",
          "name" : "Submit #474031 | code-projects Online Shoe Store 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Shoe Store 1.0. It has been rated as critical. This issue affects some unknown processing of the file /details.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T08:15Z",
    "lastModifiedDate" : "2025-01-22T15:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0205",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/832bc65fadd7d49894f68a75f834c7f3",
          "name" : "https://gist.github.com/th4s1s/832bc65fadd7d49894f68a75f834c7f3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290142",
          "name" : "VDB-290142 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290142",
          "name" : "VDB-290142 | code-projects Online Shoe Store details2.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474032",
          "name" : "Submit #474032 | code-projects Online Shoe Store 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Online Shoe Store 1.0. Affected is an unknown function of the file /details2.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T09:15Z",
    "lastModifiedDate" : "2025-01-22T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0206",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/955b71b20235dddf30689d4b85b4d271",
          "name" : "https://gist.github.com/th4s1s/955b71b20235dddf30689d4b85b4d271",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290143",
          "name" : "VDB-290143 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290143",
          "name" : "VDB-290143 | code-projects Online Shoe Store index.php access control",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474033",
          "name" : "Submit #474033 | code-projects Online Shoe Store 1.0 Improper Access Controls",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Online Shoe Store 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T12:15Z",
    "lastModifiedDate" : "2025-01-22T15:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0207",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/d10dfaebae75c8dbe54ad83d63725d81",
          "name" : "https://gist.github.com/th4s1s/d10dfaebae75c8dbe54ad83d63725d81",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290144",
          "name" : "VDB-290144 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290144",
          "name" : "VDB-290144 | code-projects Online Shoe Store login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474035",
          "name" : "Submit #474035 | code-projects Online Shoe Store 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in code-projects Online Shoe Store 1.0. Affected by this issue is some unknown functionality of the file /function/login.php. The manipulation of the argument password leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T13:15Z",
    "lastModifiedDate" : "2025-01-10T21:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0208",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/24925a20d1f9336858dee1cbbb30c249",
          "name" : "https://gist.github.com/th4s1s/24925a20d1f9336858dee1cbbb30c249",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290145",
          "name" : "VDB-290145 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290145",
          "name" : "VDB-290145 | code-projects Online Shoe Store summary.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474038",
          "name" : "Submit #474038 | code-projects Online Shoe Store 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in code-projects Online Shoe Store 1.0. This affects an unknown part of the file /summary.php. The manipulation of the argument tid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_shoe_store:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T13:15Z",
    "lastModifiedDate" : "2025-01-10T21:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0210",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/Blind%20SQL%20Injection%20in%20School%20Faculty%20Scheduling%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/Blind%20SQL%20Injection%20in%20School%20Faculty%20Scheduling%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290155",
          "name" : "VDB-290155 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290155",
          "name" : "VDB-290155 | Campcodes School Faculty Scheduling System ajax.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474112",
          "name" : "Submit #474112 | CampCodes School Faculty Scheduling System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Campcodes School Faculty Scheduling System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/ajax.php?action=login. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_faculty_scheduling_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T14:15Z",
    "lastModifiedDate" : "2025-01-10T21:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0211",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/LFI%20in%20School%20Faculty%20Scheduling%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/LFI%20in%20School%20Faculty%20Scheduling%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290156",
          "name" : "VDB-290156 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290156",
          "name" : "VDB-290156 | Campcodes School Faculty Scheduling System index.php file inclusion",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474115",
          "name" : "Submit #474115 | CampCodes School Faculty Scheduling System 1.0 File Inclusion",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Campcodes School Faculty Scheduling System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /admin/index.php. The manipulation of the argument page leads to file inclusion. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_faculty_scheduling_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T15:15Z",
    "lastModifiedDate" : "2025-01-10T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0212",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/SQL%20Injection%20in%20Student%20Grading%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/SQL%20Injection%20in%20Student%20Grading%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290157",
          "name" : "VDB-290157 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290157",
          "name" : "VDB-290157 | Campcodes Student Grading System view_students.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474168",
          "name" : "Submit #474168 | CampCodes Student Grading System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Campcodes Student Grading System 1.0. It has been classified as critical. This affects an unknown part of the file /view_students.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:student_grading_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T16:15Z",
    "lastModifiedDate" : "2025-01-10T18:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0213",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/Remote%20Code%20Execution%20via%20Arbitrary%20File%20Upload%20in%20Project%20Management%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/Remote%20Code%20Execution%20via%20Arbitrary%20File%20Upload%20in%20Project%20Management%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290158",
          "name" : "VDB-290158 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290158",
          "name" : "VDB-290158 | Campcodes Project Management System update_forms.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474200",
          "name" : "Submit #474200 | CampCodes Project Management System 1.0 RCE via Arbitrary File Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Campcodes Project Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /forms/update_forms.php?action=change_pic2&id=4. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:project_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-04T17:15Z",
    "lastModifiedDate" : "2025-01-10T18:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0214",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/ff4f29f4e7830e9e91988c7195d77039",
          "name" : "https://gist.github.com/mcdruid/ff4f29f4e7830e9e91988c7195d77039",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290159",
          "name" : "VDB-290159 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290159",
          "name" : "VDB-290159 | TMD Custom Header Menu index.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474299",
          "name" : "Submit #474299 | TMD TMD Custom Header Menu OpenCart module 4.0.0.1 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TMD Custom Header Menu 4.0.0.1 on OpenCart. It has been rated as problematic. This issue affects some unknown processing of the file /admin/index.php. The manipulation of the argument headermenu_id leads to sql injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-04T17:15Z",
    "lastModifiedDate" : "2025-01-04T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0215",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/updraftplus/tags/1.24.12/includes/updraft-admin-common.js#L4404",
          "name" : "https://plugins.trac.wordpress.org/browser/updraftplus/tags/1.24.12/includes/updraft-admin-common.js#L4404",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/updraftplus/tags/1.24.12/includes/updraft-admin-common.js#L4439",
          "name" : "https://plugins.trac.wordpress.org/browser/updraftplus/tags/1.24.12/includes/updraft-admin-common.js#L4439",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/af568eea-59ce-467e-ba03-625d04d3db6e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/af568eea-59ce-467e-ba03-625d04d3db6e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The UpdraftPlus: WP Backup & Migration Plugin plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the showdata and initiate_restore parameters in all versions up to, and including, 1.24.12 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick an admin user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-15T23:15Z",
    "lastModifiedDate" : "2025-01-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0217",
        "ASSIGNER" : "secure@beyondtrust.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.beyondtrust.com/trust-center/security-advisories/bt25-03",
          "name" : "https://www.beyondtrust.com/trust-center/security-advisories/bt25-03",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "BeyondTrust Privileged Remote Access (PRA) versions prior to 25.1 are vulnerable to a local authentication bypass. A local authenticated attacker can view the connection details of a ShellJump session that was initiated with external tools, allowing unauthorized access to connected sessions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:beyondtrust:privileged_remote_access:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "25.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-05T17:18Z",
    "lastModifiedDate" : "2025-08-01T21:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0218",
        "ASSIGNER" : "cna@postgresql.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-330"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pgadmin-org/pgagent/commit/1ecd193a2be3a3dc9e98f369495e1a792e6d508c",
          "name" : "https://github.com/pgadmin-org/pgagent/commit/1ecd193a2be3a3dc9e98f369495e1a792e6d508c",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When batch jobs are executed by pgAgent, a script is created in a temporary directory and then executed. In versions of pgAgent prior to 4.2.3, an insufficiently seeded random number generator is used when generating the directory name, leading to the possibility for a local attacker to pre-create the directory and thus prevent pgAgent from executing jobs, disrupting scheduled tasks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pgadmin:pgagent:*:*:*:*:*:postgresql:*:*",
          "versionEndExcluding" : "4.2.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-01-07T20:15Z",
    "lastModifiedDate" : "2025-02-11T21:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0219",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.290198",
          "name" : "VDB-290198 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290198",
          "name" : "VDB-290198 | Trimble SPS851 Receiver Status Identity Tab cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.464906",
          "name" : "Submit #464906 | Trimble SPS851 488.01 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Trimble SPS851 488.01. Affected by this issue is some unknown functionality of the component Receiver Status Identity Tab. The manipulation of the argument System Name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-05T06:15Z",
    "lastModifiedDate" : "2025-01-05T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0220",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/renanmalafatti/CVE/blob/main/CVE-2025-0220.md",
          "name" : "https://github.com/renanmalafatti/CVE/blob/main/CVE-2025-0220.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290199",
          "name" : "VDB-290199 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290199",
          "name" : "VDB-290199 | Trimble SPS851 Ethernet Configuration Menu cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.464943",
          "name" : "Submit #464943 | trimble SPS851 488.01 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Trimble SPS851 488.01. This affects an unknown part of the component Ethernet Configuration Menu. The manipulation of the argument Hostname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-05T13:15Z",
    "lastModifiedDate" : "2025-01-05T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0221",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://shareforall.notion.site/IOBit-Protected-Folder-pffilter-0x22200C-NPD-DOS-15260437bb1e80b2a477d42396d5d06c",
          "name" : "https://shareforall.notion.site/IOBit-Protected-Folder-pffilter-0x22200C-NPD-DOS-15260437bb1e80b2a477d42396d5d06c",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290200",
          "name" : "VDB-290200 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290200",
          "name" : "VDB-290200 | IOBit Protected Folder IOCTL pffilter.sys 0x22200c null pointer dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.466955",
          "name" : "Submit #466955 | IOBit Protected Folder V1.3.0 NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in IOBit Protected Folder up to 1.3.0 and classified as problematic. This vulnerability affects the function 0x22200c in the library pffilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:i0bit:protected_folder:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-05T15:15Z",
    "lastModifiedDate" : "2025-01-23T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0222",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://shareforall.notion.site/IOBit-Uninstaller-IUProcessFilter-0x8001E000-NPD-DOS-15260437bb1e809c81bbc484c53b17bc",
          "name" : "https://shareforall.notion.site/IOBit-Uninstaller-IUProcessFilter-0x8001E000-NPD-DOS-15260437bb1e809c81bbc484c53b17bc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290201",
          "name" : "VDB-290201 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290201",
          "name" : "VDB-290201 | IObit Protected Folder IOCTL IUProcessFilter.sys 0x8001E004 null pointer dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.466956",
          "name" : "Submit #466956 | IOBit  Uninstaller 13.6.0.5 NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in IObit Protected Folder up to 13.6.0.5 and classified as problematic. This issue affects the function 0x8001E000/0x8001E004 in the library IUProcessFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:i0bit:protected_folder:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "13.6.0.0",
          "versionEndIncluding" : "13.6.0.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-05T16:15Z",
    "lastModifiedDate" : "2025-01-23T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0223",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://shareforall.notion.site/IOBit-Uninstaller-IURegistryFilter-0x8001E000-NPD-DOS-15260437bb1e80e482e0e3c9b22b58d0",
          "name" : "https://shareforall.notion.site/IOBit-Uninstaller-IURegistryFilter-0x8001E000-NPD-DOS-15260437bb1e80e482e0e3c9b22b58d0",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290202",
          "name" : "VDB-290202 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290202",
          "name" : "VDB-290202 | IObit Protected Folder IOCTL IURegistryFilter.sys 0x8001E010 null pointer dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.466963",
          "name" : "Submit #466963 | IOBit Uninstaller 13.6.0.5 NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in IObit Protected Folder up to 13.6.0.5. It has been classified as problematic. Affected is the function 0x8001E000/0x8001E00C/0x8001E004/0x8001E010 in the library IURegistryFilter.sys of the component IOCTL Handler. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:i0bit:protected_folder:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "13.6.0.0",
          "versionEndIncluding" : "13.6.0.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-05T16:15Z",
    "lastModifiedDate" : "2025-01-23T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0224",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://netsecfish.notion.site/Sensitive-Device-Information-Disclosure-in-Provision-ISR-DVR-1626b683e67c803881befbc730a93bf6?pvs=4",
          "name" : "https://netsecfish.notion.site/Sensitive-Device-Information-Disclosure-in-Provision-ISR-DVR-1626b683e67c803881befbc730a93bf6?pvs=4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290203",
          "name" : "VDB-290203 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290203",
          "name" : "VDB-290203 | Provision-ISR SH-4050A-2 server.js information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.467085",
          "name" : "Submit #467085 | Provision-ISR SH-4050A-2, SH-4100A-2L(MM), SH-8100A-2L(MM), SH-16200A-2(1U), SH-16200A-5(1U) , NVR5-8200PX 1.2.6.0R0.B180303h.1.D00.U2(4A21S), 1.2.6.0R0.B180303h.1.D00.U2(4A21T), 1.2.6.0R0.B180303h.1.N0K.U2(8A218), 1.2.6.0R0.B180303h.1 Information Disclos",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Provision-ISR SH-4050A-2, SH-4100A-2L(MM), SH-8100A-2L(MM), SH-16200A-2(1U), SH-16200A-5(1U) and NVR5-8200PX up to 20241220. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /server.js. The manipulation leads to information disclosure. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-05T17:15Z",
    "lastModifiedDate" : "2025-01-05T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0225",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          }, {
            "lang" : "en",
            "value" : "CWE-25"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BxYQ/ld/blob/main/file_read4/poc.py",
          "name" : "https://github.com/BxYQ/ld/blob/main/file_read4/poc.py",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/BxYQ/ld/tree/main/file_read4",
          "name" : "https://github.com/BxYQ/ld/tree/main/file_read4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290215",
          "name" : "VDB-290215 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290215",
          "name" : "VDB-290215 | Tsinghua Unigroup Electronic Archives System exampleDownload.html path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474264",
          "name" : "Submit #474264 | Tsinghua Unigroup Software Systems Co., Ltd. Tsinghua Electronic Archives System  3.2.210802(62532) release  File and Directory Information Exposure",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this vulnerability is an unknown functionality of the file /setting/ClassFy/exampleDownload.html. The manipulation of the argument name leads to path traversal: '/../filedir'. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-05T17:15Z",
    "lastModifiedDate" : "2025-01-05T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0226",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BxYQ/ld/blob/main/file_read2/poc.py",
          "name" : "https://github.com/BxYQ/ld/blob/main/file_read2/poc.py",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/BxYQ/ld/tree/main/file_read2",
          "name" : "https://github.com/BxYQ/ld/tree/main/file_read2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290216",
          "name" : "VDB-290216 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290216",
          "name" : "VDB-290216 | Tsinghua Unigroup Electronic Archives System downLoad.html download information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474265",
          "name" : "Submit #474265 | Tsinghua Unigroup Software Systems Co., Ltd. Tsinghua Electronic Archives System  3.2.210802(62532) release  File and Directory Information Exposure",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). Affected by this issue is the function download of the file /collect/PortV4/downLoad.html. The manipulation of the argument path leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-05T18:15Z",
    "lastModifiedDate" : "2025-01-05T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0227",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BxYQ/ld/blob/main/file_read1/poc.py",
          "name" : "https://github.com/BxYQ/ld/blob/main/file_read1/poc.py",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/BxYQ/ld/tree/main/file_read1",
          "name" : "https://github.com/BxYQ/ld/tree/main/file_read1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290217",
          "name" : "VDB-290217 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290217",
          "name" : "VDB-290217 | Tsinghua Unigroup Electronic Archives System downLoad.html information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474266",
          "name" : "Submit #474266 | Tsinghua Unigroup Software Systems Co., Ltd. Tsinghua Electronic Archives System  3.2.210802(62532) release  File and Directory Information Exposure",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Tsinghua Unigroup Electronic Archives System 3.2.210802(62532). This affects an unknown part of the file /Logs/Annals/downLoad.html. The manipulation of the argument path leads to information disclosure. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-05T18:15Z",
    "lastModifiedDate" : "2025-01-05T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0228",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290218",
          "name" : "VDB-290218 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290218",
          "name" : "VDB-290218 | code-projects Local Storage Todo App index.html cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474049",
          "name" : "Submit #474049 | code-projects Local Storage Todo App 1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Local Storage Todo App 1.0 and classified as problematic. This vulnerability affects unknown code of the file /js-todo-app/index.html. The manipulation of the argument Add leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:local_storage_todo_app:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-05T19:15Z",
    "lastModifiedDate" : "2025-01-10T19:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0229",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Huandtx/cve/blob/main/cve/sql1.md",
          "name" : "https://github.com/Huandtx/cve/blob/main/cve/sql1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290225",
          "name" : "VDB-290225 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290225",
          "name" : "VDB-290225 | code-projects Travel Management System enquiry.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474572",
          "name" : "Submit #474572 | Code-projects travel-management-system v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in code-projects Travel Management System 1.0. This issue affects some unknown processing of the file /enquiry.php. The manipulation of the argument pid/t1/t2/t3/t4/t5/t6/t7 leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:travel_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-05T20:15Z",
    "lastModifiedDate" : "2025-01-10T19:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0230",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Huandtx/cve/blob/main/cve/Responsive%20Hotel%20Site/sql1.md",
          "name" : "https://github.com/Huandtx/cve/blob/main/cve/Responsive%20Hotel%20Site/sql1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290226",
          "name" : "VDB-290226 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290226",
          "name" : "VDB-290226 | code-projects Responsive Hotel Site print.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474581",
          "name" : "Submit #474581 | code-projects Responsive Hotel Site v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in code-projects Responsive Hotel Site 1.0. Affected is an unknown function of the file /admin/print.php. The manipulation of the argument pid leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:responsive_hotel_site:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-05T21:15Z",
    "lastModifiedDate" : "2025-01-10T19:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0231",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/gh464646/CVE/issues/1",
          "name" : "https://github.com/gh464646/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290227",
          "name" : "VDB-290227 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290227",
          "name" : "VDB-290227 | Codezips Gym Management System submit_payments.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474596",
          "name" : "Submit #474596 | Gym Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Codezips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/submit_payments.php. The manipulation of the argument m_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-05T22:15Z",
    "lastModifiedDate" : "2025-01-10T19:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0232",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/alc9700jmo/CVE/issues/7",
          "name" : "https://github.com/alc9700jmo/CVE/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290228",
          "name" : "VDB-290228 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290228",
          "name" : "VDB-290228 | Codezips Blood Bank Management System successadmin.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474597",
          "name" : "Submit #474597 | Blood Bank Management System In PHP With Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Blood Bank Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /successadmin.php. The manipulation of the argument psw leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-05T22:15Z",
    "lastModifiedDate" : "2025-01-10T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0233",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/1074923869/CVE/issues/1",
          "name" : "https://github.com/1074923869/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290229",
          "name" : "VDB-290229 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.290229",
          "name" : "VDB-290229 | Codezips Project Management System course.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.474673",
          "name" : "Submit #474673 | Codezips Project Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/course.php. The manipulation of the argument course_name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-05T23:15Z",
    "lastModifiedDate" : "2025-01-10T17:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0234",
        "ASSIGNER" : "canon@example.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://psirt.canon/advisory-information/cp2025-002/",
          "name" : "https://psirt.canon/advisory-information/cp2025-002/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds vulnerability in curve segmentation processing of Generic PCL6 V4 Printer Driver / Generic UFR II V4 Printer Driver / Generic LIPSLX V4 Printer Driver."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T08:12Z",
    "lastModifiedDate" : "2025-02-26T08:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0235",
        "ASSIGNER" : "canon@example.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://psirt.canon/advisory-information/cp2025-002/",
          "name" : "https://psirt.canon/advisory-information/cp2025-002/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds vulnerability due to improper memory release during image rendering in Generic PCL6 V4 Printer Driver / Generic UFR II V4 Printer Driver / Generic LIPSLX V4 Printer Driver."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T08:12Z",
    "lastModifiedDate" : "2025-02-26T08:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0236",
        "ASSIGNER" : "canon@example.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://psirt.canon/advisory-information/cp2025-002/",
          "name" : "https://psirt.canon/advisory-information/cp2025-002/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds vulnerability in slope processing during curve rendering in Generic PCL6 V4 Printer Driver / Generic UFR II V4 Printer Driver / Generic LIPSLX V4 Printer Driver."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T08:12Z",
    "lastModifiedDate" : "2025-02-26T08:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0237",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1915257",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1915257",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WebChannel API, which is used to transport various information across processes, did not check the sending principal but rather accepted the principal being sent. This could have led to privilege escalation attacks. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0238",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1915535",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1915535",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-03/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-03/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Assuming a controlled failed memory allocation, an attacker could have caused a use-after-free, leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "116.0",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.19.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0239",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1929156",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1929156",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When using Alt-Svc, ALPN did not properly validate certificates when the original server is redirecting to an insecure site. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0240",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1929623",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1929623",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Parsing a JavaScript module as JSON could, under some circumstances, cause cross-compartment access, which may result in a use-after-free. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0241",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1933023",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When segmenting specially crafted text, segmentation would corrupt memory leading to a potentially exploitable crash. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0242",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1874523%2C1926454%2C1931873%2C1932169",
          "name" : "Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6",
          "refsource" : "",
          "tags" : [ "Broken Link", "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-03/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-03/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 115.18, Firefox ESR 128.5, Thunderbird 115.18, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Firefox ESR < 115.19, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndIncluding" : "115.19.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "116.0",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0243",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1827142%2C1932783",
          "name" : "Memory safety bugs fixed in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6",
          "refsource" : "",
          "tags" : [ "Broken Link", "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-02/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 133, Thunderbird 133, Firefox ESR 128.5, and Thunderbird 128.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134, Firefox ESR < 128.6, Thunderbird < 134, and Thunderbird < 128.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0244",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1929584",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1929584",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When redirecting to an invalid protocol scheme, an attacker could spoof the address bar. \n*Note: This issue only affected Android operating systems. Other operating systems are unaffected.* This vulnerability affects Firefox < 134."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0245",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1895342",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1895342",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed. This vulnerability affects Firefox < 134."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0246",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1912709",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1912709",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When using an invalid protocol scheme, an attacker could spoof the address bar. \n*Note: This issue only affected Android operating systems. Other operating systems are unaffected.*\n*Note: This issue is a different issue from CVE-2025-0244. This vulnerability affects Firefox < 134."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "134.0",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0247",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1835193%2C1910021%2C1919803%2C1931576%2C1931948%2C1932173",
          "name" : "Memory safety bugs fixed in Firefox 134 and Thunderbird 134",
          "refsource" : "",
          "tags" : [ "Broken Link", "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-04/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 133 and Thunderbird 133. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 134 and Thunderbird < 134."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-03T16:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0249",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368",
          "name" : "VDB-299060 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL IEM is affected by an improper invalidation of access or JWT token vulnerability.  A token was not invalidated which may allow attackers to access sensitive data without authorization."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T00:15Z",
    "lastModifiedDate" : "2025-07-25T15:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0250",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368",
          "name" : "VDB-299060 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL IEM is affected by an authorization token sent in cookie vulnerability.  A token used for authentication and authorization is being handled in a manner that may increase its exposure to security risks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T00:15Z",
    "lastModifiedDate" : "2025-07-25T15:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0251",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368",
          "name" : "VDB-299060 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL IEM is affected by a concurrent login vulnerability.  The application allows multiple concurrent sessions using the same user credentials, which may introduce security risks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T01:15Z",
    "lastModifiedDate" : "2025-07-25T15:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0252",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368",
          "name" : "VDB-299060 | PyTorch Quantized Sigmoid Module nnq_Sigmoid initialization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL IEM is affected by a password in cleartext vulnerability.  Sensitive information is transmitted without adequate protection, potentially exposing it to unauthorized access during transit."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T01:15Z",
    "lastModifiedDate" : "2025-07-25T15:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0253",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0122368",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL IEM is affected by a cookie attribute not set vulnerability due to inconsistency of certain security-related configurations which could increase exposure to potential vulnerabilities."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-25T01:15Z",
    "lastModifiedDate" : "2025-07-25T15:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0254",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120000",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120000",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL Digital Experience components Ring API and dxclient may be vulnerable to man-in-the-middle (MitM) attacks prior to 9.5 CF226.  An attacker could intercept and potentially alter communication between two parties."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T14:15Z",
    "lastModifiedDate" : "2025-03-20T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0255",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119060",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119060",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL DevOps Deploy / HCL Launch could allow a remote privileged authenticated attacker to execute arbitrary commands on the system by sending specially crafted input containing special elements."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:8.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0.0",
          "versionEndExcluding" : "7.0.5.26",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndExcluding" : "7.3.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-24T17:15Z",
    "lastModifiedDate" : "2025-04-11T17:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0256",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119059",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119059",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL DevOps Deploy / HCL Launch could allow an authenticated user to obtain sensitive information about other users on the system due to missing authorization for a function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:8.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0.0",
          "versionEndExcluding" : "7.0.5.26",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndExcluding" : "7.3.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-24T16:15Z",
    "lastModifiedDate" : "2025-04-11T17:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0257",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119061",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0119061",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL DevOps Deploy / HCL Launch could allow unauthorized access to other services or potential exposure of sensitive data due to missing authentication in its Agent Relay service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndExcluding" : "7.3.2.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-02T22:15Z",
    "lastModifiedDate" : "2025-04-10T14:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0272",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120137",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120137",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL DevOps Deploy / HCL Launch is vulnerable to HTML injection. This vulnerability may allow a user to embed arbitrary HTML tags in the Web UI potentially leading to sensitive information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.0.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0.0",
          "versionEndIncluding" : "7.0.5.26",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndIncluding" : "7.3.2.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-04-03T15:15Z",
    "lastModifiedDate" : "2025-04-10T13:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0273",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120138",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120138",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL DevOps Deploy / HCL Launch stores potentially sensitive authentication token information in log files that could be read by a local user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.0.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0.0",
          "versionEndIncluding" : "7.0.5.26",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hcltechsw:hcl_launch:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndIncluding" : "7.3.2.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-27T05:15Z",
    "lastModifiedDate" : "2025-04-11T16:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0278",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120335",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120335",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL Traveler is affected by an internal path disclosure in a Windows application when the application inadvertently reveals internal file paths, in error messages, debug logs, or responses to user requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-03T22:15Z",
    "lastModifiedDate" : "2025-04-03T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0279",
        "ASSIGNER" : "psirt@hcl.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120336",
          "name" : "https://support.hcl-software.com/csm?id=kb_article&sysparm_article=KB0120336",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HCL Traveler generates some error messages that provide detailed information about errors and failures, such as internal paths, file names, sensitive tokens, credentials, error codes, or stack traces.  Attackers could exploit this information to gain insights into the system's architecture and potentially launch targeted attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-03T22:15Z",
    "lastModifiedDate" : "2025-04-03T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0281",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lunary-ai/lunary/commit/fa0fd7742ae029ed934690d282519263f5d838de",
          "name" : "https://github.com/lunary-ai/lunary/commit/fa0fd7742ae029ed934690d282519263f5d838de",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/b3f4a655-5b08-4fef-be2c-aac8703ad5d0",
          "name" : "https://huntr.com/bounties/b3f4a655-5b08-4fef-be2c-aac8703ad5d0",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored cross-site scripting (XSS) vulnerability exists in lunary-ai/lunary versions 1.6.7 and earlier. An attacker can inject malicious JavaScript into the SAML IdP XML metadata, which is used to generate the SAML login redirect URL. This URL is then set as the value of `window.location.href` without proper validation or sanitization. This vulnerability allows the attacker to execute arbitrary JavaScript in the context of the user's browser, potentially leading to session hijacking, data theft, or other malicious actions. The issue is fixed in version 1.7.10."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lunary:lunary:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.7.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-28T14:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0282",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day",
          "name" : "https://cloud.google.com/blog/topics/threat-intelligence/ivanti-connect-secure-vpn-zero-day",
          "refsource" : "",
          "tags" : [ "Exploit", "Technical Description" ]
        }, {
          "url" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283",
          "name" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/sfewer-r7/CVE-2025-0282",
          "name" : "https://github.com/sfewer-r7/CVE-2025-0282",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://labs.watchtowr.com/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/",
          "name" : "https://labs.watchtowr.com/exploitation-walkthrough-and-techniques-ivanti-connect-secure-rce-cve-2025-0282/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282",
          "name" : "https://www.cisa.gov/cisa-mitigation-instructions-cve-2025-0282",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        }, {
          "url" : "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-0282",
          "name" : "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2025-0282",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a remote unauthenticated attacker to achieve remote code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.0,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-01-08T23:15Z",
    "lastModifiedDate" : "2025-03-17T19:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0283",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283",
          "name" : "https://forums.ivanti.com/s/article/Security-Advisory-Ivanti-Connect-Secure-Policy-Secure-ZTA-Gateways-CVE-2025-0282-CVE-2025-0283",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stack-based buffer overflow in Ivanti Connect Secure before version 22.7R2.5, Ivanti Policy Secure before version 22.7R1.2, and Ivanti Neurons for ZTA gateways before version 22.7R2.3 allows a local authenticated attacker to escalate their privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "9.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.1:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r16.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r15.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r4.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r11.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r11.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r11.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:21.9:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:21.12:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.1:r6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r1.0:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r10.0:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r10.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r11.0:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r11.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r12.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r12.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r13.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r14.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r17:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r17.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r17.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r2.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18.7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18.8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:9.1:r18.9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "22.2",
          "versionEndExcluding" : "22.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "22.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.2:r5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.3:r4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.4:r3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.5:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.6:r1.7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:neurons_for_zero-trust_access:22.7:r1.6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-08T23:15Z",
    "lastModifiedDate" : "2025-01-14T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0285",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "name" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.kb.cert.org/vuls/id/726882",
          "name" : "https://www.kb.cert.org/vuls/id/726882",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.paragon-software.com/support/#patches",
          "name" : "https://www.paragon-software.com/support/#patches",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Various Paragon Software products contain an arbitrary kernel memory mapping vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to perform privilege escalation exploits."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_backup_\\&_recovery:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4",
          "versionEndIncluding" : "5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-06-25T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0286",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "name" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.kb.cert.org/vuls/id/726882",
          "name" : "https://www.kb.cert.org/vuls/id/726882",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.paragon-software.com/support/#patches",
          "name" : "https://www.paragon-software.com/support/#patches",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Various Paragon Software products contain an arbitrary kernel memory write vulnerability within biontdrv.sys that is caused by a failure to properly validate the length of user supplied data, which can allow an attacker to execute arbitrary code on the victim machine."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_backup_\\&_recovery:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4",
          "versionEndIncluding" : "5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-06-25T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0287",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "name" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.kb.cert.org/vuls/id/726882",
          "name" : "https://www.kb.cert.org/vuls/id/726882",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.paragon-software.com/support/#patches",
          "name" : "https://www.paragon-software.com/support/#patches",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Various Paragon Software products contain a null pointer dereference vulnerability within biontdrv.sys that is caused by a lack of a valid MasterLrp structure in the input buffer, allowing an attacker to execute arbitrary code in the kernel, facilitating privilege escalation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_backup_\\&_recovery:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4",
          "versionEndIncluding" : "5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-06-25T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0288",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "name" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.kb.cert.org/vuls/id/726882",
          "name" : "https://www.kb.cert.org/vuls/id/726882",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.paragon-software.com/support/#patches",
          "name" : "https://www.paragon-software.com/support/#patches",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Various Paragon Software products contain an arbitrary kernel memory vulnerability within biontdrv.sys, facilitated by the memmove function, which does not validate or sanitize user controlled input, allowing an attacker the ability to write arbitrary kernel memory and perform privilege escalation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_backup_\\&_recovery:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4",
          "versionEndIncluding" : "5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-06-25T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0289",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "name" : "https://paragon-software.zendesk.com/hc/en-us/articles/32993902732817-IMPORTANT-Paragon-Driver-Security-Patch-for-All-Products-of-Hard-Disk-Manager-Product-Line-Biontdrv-sys",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.kb.cert.org/vuls/id/726882",
          "name" : "https://www.kb.cert.org/vuls/id/726882",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.paragon-software.com/support/#patches",
          "name" : "https://www.paragon-software.com/support/#patches",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Various Paragon Software products contain an insecure kernel resource access vulnerability facilitated by the driver not validating the MappedSystemVa pointer before passing it to HalReturnToFirmware, which can allows an attacker the ability to compromise the service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_backup_\\&_recovery:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_disk_wiper:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_drive_copy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "16",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_hard_disk_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_migrate_os_to_ssd:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4",
          "versionEndIncluding" : "5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:paragon-software:paragon_partition_manager:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "15",
          "versionEndIncluding" : "17.39",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-06-25T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0290",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/372134",
          "name" : "GitLab Issue #372134",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.0 prior to 17.5.5, from 17.6 prior to 17.6.3, and from 17.7 prior to 17.7.1. Under certain conditions, processing of CI artifacts metadata could cause background jobs to become unresponsive."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.6.0",
          "versionEndExcluding" : "17.6.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.6.0",
          "versionEndExcluding" : "17.6.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "15.0.0",
          "versionEndExcluding" : "17.5.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "15.0.0",
          "versionEndExcluding" : "17.5.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.7.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.7.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T09:15Z",
    "lastModifiedDate" : "2025-08-05T20:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0291",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/383356864",
          "name" : "https://issues.chromium.org/issues/383356864",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Type Confusion in V8 in Google Chrome prior to 131.0.6778.264 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "131.0.6778.264",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-08T19:15Z",
    "lastModifiedDate" : "2025-02-11T15:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0292",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
          "name" : "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SSRF in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to access internal network services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "22.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "22.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-08T16:15Z",
    "lastModifiedDate" : "2025-07-15T12:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0293",
        "ASSIGNER" : "responsible.disclosure@ivanti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-93"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
          "name" : "https://forums.ivanti.com/s/article/July-Security-Advisory-Ivanti-Connect-Secure-and-Ivanti-Policy-Secure-Multiple-CVEs",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CLRF injection in Ivanti Connect Secure before version 22.7R2.8 and Ivanti Policy Secure before version 22.7R1.5 allows a remote authenticated attacker with admin rights to write to a protected configuration file on disk."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "22.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "22.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:connect_secure:22.7:r2.7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ivanti:policy_secure:22.7:r1.4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-08T16:15Z",
    "lastModifiedDate" : "2025-07-10T13:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0294",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiaosguang/cve/blob/main/Home%20Clean%20Services%20Management/Home%20Clean%20Services%20Management%20System%20process.php%20id%20SQL%20injection.md",
          "name" : "https://github.com/xiaosguang/cve/blob/main/Home%20Clean%20Services%20Management/Home%20Clean%20Services%20Management%20System%20process.php%20id%20SQL%20injection.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/xiaosguang/cve/blob/main/Home%20Clean%20Services%20Management/Home%20Clean%20Services%20Management%20System%20process.php%20id%20SQL%20injection.md",
          "name" : "https://github.com/xiaosguang/cve/blob/main/Home%20Clean%20Services%20Management/Home%20Clean%20Services%20Management%20System%20process.php%20id%20SQL%20injection.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290443",
          "name" : "VDB-290443 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290443",
          "name" : "VDB-290443 | SourceCodester Home Clean Services Management System process.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475076",
          "name" : "Submit #475076 | Home Clean Services Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in SourceCodester Home Clean Services Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /public_html/admin/process.php. The manipulation of the argument type/length/business leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:acetech:home_clean_services_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-07T14:15Z",
    "lastModifiedDate" : "2025-04-29T20:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0295",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/19d21e7fdbaf3512fccfd75df3080657",
          "name" : "https://gist.github.com/th4s1s/19d21e7fdbaf3512fccfd75df3080657",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290444",
          "name" : "VDB-290444 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290444",
          "name" : "VDB-290444 | code-projects Online Book Shop booklist.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475134",
          "name" : "Submit #475134 | code-projects Online Book Shop 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Book Shop 1.0 and classified as problematic. Affected by this issue is some unknown functionality of the file /booklist.php?subcatid=1. The manipulation of the argument subcatnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T15:15Z",
    "lastModifiedDate" : "2025-04-03T13:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0296",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/4ebf1c60bbec213119f2eaac9cd29118",
          "name" : "https://gist.github.com/th4s1s/4ebf1c60bbec213119f2eaac9cd29118",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290445",
          "name" : "VDB-290445 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290445",
          "name" : "VDB-290445 | code-projects Online Book Shop booklist.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475135",
          "name" : "Submit #475135 | code-projects Online Book Shop 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Book Shop 1.0. It has been classified as critical. This affects an unknown part of the file /booklist.php. The manipulation of the argument subcatid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-07T15:15Z",
    "lastModifiedDate" : "2025-04-03T13:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0297",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/782f2e19784f48bb80e4d658a49bd680",
          "name" : "https://gist.github.com/th4s1s/782f2e19784f48bb80e4d658a49bd680",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290446",
          "name" : "VDB-290446 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290446",
          "name" : "VDB-290446 | code-projects Online Book Shop detail.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475138",
          "name" : "Submit #475138 | code-projects Online Book Shop 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Book Shop 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /detail.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-17T02:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0298",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/5435e605e6e9f14a5b76c313483eb58a",
          "name" : "https://gist.github.com/th4s1s/5435e605e6e9f14a5b76c313483eb58a",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/5435e605e6e9f14a5b76c313483eb58a",
          "name" : "https://gist.github.com/th4s1s/5435e605e6e9f14a5b76c313483eb58a",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290447",
          "name" : "VDB-290447 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290447",
          "name" : "VDB-290447 | code-projects Online Book Shop process_login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475159",
          "name" : "Submit #475159 | code-projects Online Book Shop 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Book Shop 1.0. It has been rated as critical. This issue affects some unknown processing of the file /process_login.php. The manipulation of the argument usernm leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-07T16:15Z",
    "lastModifiedDate" : "2025-04-07T18:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0299",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/b30a06e83b98ddcbc69b9038c145d8cd",
          "name" : "https://gist.github.com/th4s1s/b30a06e83b98ddcbc69b9038c145d8cd",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/b30a06e83b98ddcbc69b9038c145d8cd",
          "name" : "https://gist.github.com/th4s1s/b30a06e83b98ddcbc69b9038c145d8cd",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290448",
          "name" : "VDB-290448 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290448",
          "name" : "VDB-290448 | code-projects Online Book Shop search_result.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475285",
          "name" : "Submit #475285 | code-projects Online Book Shop 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Online Book Shop 1.0. Affected is an unknown function of the file /search_result.php. The manipulation of the argument s leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-07T17:15Z",
    "lastModifiedDate" : "2025-04-07T18:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0300",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/21abb650b4b70fe8392d8449445703f7",
          "name" : "https://gist.github.com/th4s1s/21abb650b4b70fe8392d8449445703f7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290449",
          "name" : "VDB-290449 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290449",
          "name" : "VDB-290449 | code-projects Online Book Shop subcat.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475286",
          "name" : "Submit #475286 | code-projects Online Book Shop 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Online Book Shop 1.0. Affected by this vulnerability is an unknown functionality of the file /subcat.php. The manipulation of the argument cat leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-07T17:15Z",
    "lastModifiedDate" : "2025-05-28T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0301",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/th4s1s/03262c6ce877137b61d745a2e4fe8a63",
          "name" : "https://gist.github.com/th4s1s/03262c6ce877137b61d745a2e4fe8a63",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290450",
          "name" : "VDB-290450 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290450",
          "name" : "VDB-290450 | code-projects Online Book Shop subcat.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475287",
          "name" : "Submit #475287 | code-projects Online Book Shop 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Online Book Shop 1.0. Affected by this issue is some unknown functionality of the file /subcat.php. The manipulation of the argument catnm leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:online_book_shop:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-07T18:15Z",
    "lastModifiedDate" : "2025-02-26T19:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0302",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause DOS through integer overflow."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1.0",
          "versionEndIncluding" : "4.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-07T10:15Z",
    "lastModifiedDate" : "2025-02-11T17:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0303",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through buffer overflow."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1.0",
          "versionEndIncluding" : "4.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-07T10:15Z",
    "lastModifiedDate" : "2025-02-11T17:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0304",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-02.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v4.1.2 and prior versions allow a local attacker cause the common permission is upgraded to root and sensitive information leak through use after free."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1.0",
          "versionEndIncluding" : "4.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-07T10:15Z",
    "lastModifiedDate" : "2025-02-11T17:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0305",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0306",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0306",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0306",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2336100",
          "name" : "RHBZ#2336100",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250221-0009/",
          "name" : "https://security.netapp.com/advisory/ntap-20250221-0009/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Ruby. The Ruby interpreter is vulnerable to the Marvin Attack. This attack allows the attacker to decrypt previously encrypted messages or forge signatures by exchanging a large number of messages with the vulnerable service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T04:15Z",
    "lastModifiedDate" : "2025-02-21T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0307",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T18:15Z",
    "lastModifiedDate" : "2025-02-07T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0308",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.9.1/includes/core/class-member-directory.php#L1877",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.9.1/includes/core/class-member-directory.php#L1877",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e5bb98-2652-499a-b8cd-4ebfe1c1d890?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e3e5bb98-2652-499a-b8cd-4ebfe1c1d890?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the search parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.9.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-18T06:15Z",
    "lastModifiedDate" : "2025-02-25T22:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0309",
        "ASSIGNER" : "psirt@netskope.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.amberwolf.com/blog/2025/august/breaking-into-your-network-zer0-effort/",
          "name" : "https://blog.amberwolf.com/blog/2025/august/breaking-into-your-network-zer0-effort/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-002",
          "name" : "https://www.netskope.com/company/security-compliance-and-assurance/security-advisories-and-disclosures/netskope-security-advisory-nskpsa-2025-002",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An insufficient validation on the server connection endpoint in Netskope Client allows local users to elevate privileges on the system. The insufficient validation allows Netskope Client to connect to any other server with Public Signed CA TLS certificates and send specially crafted responses to elevate privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T05:15Z",
    "lastModifiedDate" : "2025-08-15T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0311",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Codeinwp/themeisle-companion/commit/47a17c86934cebbfc3f1a812f1afcaa20515c1f7",
          "name" : "https://github.com/Codeinwp/themeisle-companion/commit/47a17c86934cebbfc3f1a812f1afcaa20515c1f7",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/Codeinwp/themeisle-companion/commit/c311050b372cf38e82d8ec9deadf4f21a8931487",
          "name" : "https://github.com/Codeinwp/themeisle-companion/commit/c311050b372cf38e82d8ec9deadf4f21a8931487",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/themeisle-companion/trunk/obfx_modules/elementor-extra-widgets/widgets/elementor/pricing-table.php#L1024",
          "name" : "https://plugins.trac.wordpress.org/browser/themeisle-companion/trunk/obfx_modules/elementor-extra-widgets/widgets/elementor/pricing-table.php#L1024",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3219568/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3219568/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/themeisle-companion/#developers",
          "name" : "https://wordpress.org/plugins/themeisle-companion/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d17a3a0-3c09-4d67-96d6-d97bde92f100?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9d17a3a0-3c09-4d67-96d6-d97bde92f100?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Orbit Fox by ThemeIsle plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Pricing Table widget in all versions up to, and including, 2.10.43 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themeisle:orbit_fox:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.10.44",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-10T07:15Z",
    "lastModifiedDate" : "2025-01-16T21:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0312",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          }, {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/522c87b6-a7ac-41b2-84f3-62fd58921f21",
          "name" : "https://huntr.com/bounties/522c87b6-a7ac-41b2-84f3-62fd58921f21",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in ollama/ollama versions <=0.3.14 allows a malicious user to create a customized GGUF model file that, when uploaded and created on the Ollama server, can cause a crash due to an unchecked null pointer dereference. This can lead to a Denial of Service (DoS) attack via remote network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "0.3.14",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-28T14:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0313",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-12055. Notes: All CVE users should reference CVE-2024-12055 instead of this CVE Record. All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-04-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0314",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/512118",
          "name" : "GitLab Issue #512118",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2922313",
          "name" : "HackerOne Bug Bounty Report #2922313",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.6.4, 17.7 before 17.7.3, and 17.8 before 17.8.1. Improper rendering of certain file types lead to cross-site scripting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.8.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.8.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.6.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.6.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-24T03:15Z",
    "lastModifiedDate" : "2025-08-05T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0315",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          }, {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/da414d29-b55a-496f-b135-17e0fcec67bc",
          "name" : "https://huntr.com/bounties/da414d29-b55a-496f-b135-17e0fcec67bc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in ollama/ollama <=0.3.14 allows a malicious user to create a customized GGUF model file, upload it to the Ollama server, and create it. This can cause the server to allocate unlimited memory, leading to a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "0.3.14",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-04-02T16:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0316",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/directory-multipurpose-wordpress-theme/10480929",
          "name" : "https://themeforest.net/item/directory-multipurpose-wordpress-theme/10480929",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ee1f412-7555-4dec-ba59-49412471a42f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3ee1f412-7555-4dec-ba59-49412471a42f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Directorybox Manager plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.5. This is due to incorrect authentication in the 'wp_dp_enquiry_agent_contact_form_submit_callback' function. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the username."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-08T22:15Z",
    "lastModifiedDate" : "2025-02-08T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0317",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-369"
          }, {
            "lang" : "en",
            "value" : "CWE-369"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/a9951bca-9bd8-49b2-b143-4cd4219f9fa0",
          "name" : "https://huntr.com/bounties/a9951bca-9bd8-49b2-b143-4cd4219f9fa0",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in ollama/ollama versions <=0.3.14 allows a malicious user to upload and create a customized GGUF model file on the Ollama server. This can lead to a division by zero error in the ggufPadding function, causing the server to crash and resulting in a Denial of Service (DoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ollama:ollama:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "0.3.14",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-04-02T16:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0318",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.9.1/includes/core/um-actions-form.php#L944",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-member/tags/2.9.1/includes/core/um-actions-form.php#L944",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ee149bf-ffa3-4906-8be2-9c3c40b28287?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4ee149bf-ffa3-4906-8be2-9c3c40b28287?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.9.1 through different error messages in the responses. This makes it possible for unauthenticated attackers to exfiltrate data from wp_usermeta table."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ultimatemember:ultimate_member:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.9.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-18T06:15Z",
    "lastModifiedDate" : "2025-02-25T22:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0320",
        "ASSIGNER" : "secure@citrix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694724",
          "name" : "https://support.citrix.com/support-home/kbsearch/article?articleNumber=CTX694724",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Local Privilege escalation allows a low-privileged user to gain SYSTEM privileges in Citrix Secure Access Client for Windows"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:citrix:secure_access_client:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.5.1.15",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-17T14:15Z",
    "lastModifiedDate" : "2025-08-06T17:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0321",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpmet.com/plugin/elementskit/",
          "name" : "https://wpmet.com/plugin/elementskit/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wpmet.com/plugin/elementskit/roadmaps/",
          "name" : "https://wpmet.com/plugin/elementskit/roadmaps/",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/204cfe20-9df1-4f6c-a38c-a21b43dde385?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/204cfe20-9df1-4f6c-a38c-a21b43dde385?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ElementsKit Pro plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the ‘url’ parameter in all versions up to, and including, 3.7.8 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmet:elementskit:*:*:*:*:pro:wordpress:*:*",
          "versionEndExcluding" : "3.7.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-28T08:15Z",
    "lastModifiedDate" : "2025-01-30T17:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0324",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/04/f3/1c/cve-2025-0324pdf-en-US-483807.pdf",
          "name" : "https://www.axis.com/dam/public/04/f3/1c/cve-2025-0324pdf-en-US-483807.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The VAPIX Device Configuration framework allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T08:15Z",
    "lastModifiedDate" : "2025-06-02T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0325",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/d0/ae/fe/cve-2025-0325pdf-en-US-483808.pdf",
          "name" : "https://www.axis.com/dam/public/d0/ae/fe/cve-2025-0325pdf-en-US-483808.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Guard Tour VAPIX API parameter allowed the use of arbitrary values and can be incorrectly called, allowing an attacker to block access to the guard tour configuration page in the web interface of the Axis device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T08:15Z",
    "lastModifiedDate" : "2025-06-02T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0327",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-03.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-03.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-269: Improper Privilege Management vulnerability exists for two services (of which one managing audit\ntrail data and the other acting as server managing client request) that could cause a loss of Confidentiality,\nIntegrity and Availability of engineering workstation when an attacker with standard privilege modifies the\nexecutable path of the windows services. To be exploited, services need to be restarted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T07:15Z",
    "lastModifiedDate" : "2025-02-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0328",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://note.zhaoj.in/share/ASPsoVCrLqKK",
          "name" : "https://note.zhaoj.in/share/ASPsoVCrLqKK",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://note.zhaoj.in/share/ASPsoVCrLqKK",
          "name" : "https://note.zhaoj.in/share/ASPsoVCrLqKK",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290792",
          "name" : "VDB-290792 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290792",
          "name" : "VDB-290792 | KaiYuanTong ECT Platform HTTP POST Request runCode.php command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.470601",
          "name" : "Submit #470601 | KaiYuanTong ECT platform <=2.0.0 Pre-Auth Command Execution",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in KaiYuanTong ECT Platform up to 2.0.0. Affected by this issue is some unknown functionality of the file /public/server/runCode.php of the component HTTP POST Request Handler. The manipulation of the argument code leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T05:15Z",
    "lastModifiedDate" : "2025-01-09T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0329",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/db101819-4404-46c9-a02e-b1b1b7ace11e/",
          "name" : "https://wpscan.com/vulnerability/db101819-4404-46c9-a02e-b1b1b7ace11e/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/db101819-4404-46c9-a02e-b1b1b7ace11e/",
          "name" : "https://wpscan.com/vulnerability/db101819-4404-46c9-a02e-b1b1b7ace11e/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AI ChatBot for WordPress  WordPress plugin before 6.2.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:quantumcloud:wpbot:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "6.2.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-06-12T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0330",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1230"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/661b388a-44d8-4ad5-862b-4dc5b80be30a",
          "name" : "https://huntr.com/bounties/661b388a-44d8-4ad5-862b-4dc5b80be30a",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In berriai/litellm version v1.52.1, an issue in proxy_server.py causes the leakage of Langfuse API keys when an error occurs while parsing team settings. This vulnerability exposes sensitive information, including langfuse_secret and langfuse_public_key, which can provide full access to the Langfuse project storing all requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:litellm:litellm:1.52.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-08-01T13:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0331",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://note.zhaoj.in/share/DsijzdQDJSAp",
          "name" : "https://note.zhaoj.in/share/DsijzdQDJSAp",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://note.zhaoj.in/share/DsijzdQDJSAp",
          "name" : "https://note.zhaoj.in/share/DsijzdQDJSAp",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290819",
          "name" : "VDB-290819 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290819",
          "name" : "VDB-290819 | YunzMall HTTP POST Request ResetpwdController.php changePwd password recovery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.471663",
          "name" : "Submit #471663 | Yunzmall <=2.4.2 Arbitrary User Password Reset Vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in YunzMall up to 2.4.2. This issue affects the function changePwd of the file /app/platform/controllers/ResetpwdController.php of the component HTTP POST Request Handler. The manipulation of the argument pwd leads to weak password recovery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T05:15Z",
    "lastModifiedDate" : "2025-01-09T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0332",
        "ASSIGNER" : "security@progress.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.telerik.com/devtools/winforms/knowledge-base/kb-security-path-traversal-cve-2025-0332",
          "name" : "https://docs.telerik.com/devtools/winforms/knowledge-base/kb-security-path-traversal-cve-2025-0332",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Progress® Telerik® UI for WinForms, versions prior to 2025 Q1 (2025.1.211), using the improper limitation of a target path can lead to decompressing an archive's content into a restricted directory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:progress:telerik_ui_for_winforms:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.1.211",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T16:15Z",
    "lastModifiedDate" : "2025-07-03T18:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0333",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md",
          "name" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md",
          "name" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290820",
          "name" : "VDB-290820 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290820",
          "name" : "VDB-290820 | leiyuxi cy-fast listData sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475297",
          "name" : "Submit #475297 | cy-fast 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in leiyuxi cy-fast 1.0. Affected is the function listData of the file /sys/role/listData. The manipulation of the argument order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T05:15Z",
    "lastModifiedDate" : "2025-01-09T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0334",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli2.md",
          "name" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli2.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290821",
          "name" : "VDB-290821 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290821",
          "name" : "VDB-290821 | leiyuxi cy-fast listData sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475302",
          "name" : "Submit #475302 | cy-fast 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /sys/user/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T06:15Z",
    "lastModifiedDate" : "2025-01-09T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0335",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Huandtx/cve/blob/main/cve/Online%20Bike%20Rental%20System/File_upload1.md",
          "name" : "https://github.com/Huandtx/cve/blob/main/cve/Online%20Bike%20Rental%20System/File_upload1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290822",
          "name" : "VDB-290822 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290822",
          "name" : "VDB-290822 | code-projects Online Bike Rental System Change Image unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475365",
          "name" : "Submit #475365 | code-projects Online Bike Rental System v1.0 Incomplete Identification of Uploaded File Variables",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Bike Rental System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the component Change Image Handler. The manipulation leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other endpoints might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:online_bike_rental_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T06:15Z",
    "lastModifiedDate" : "2025-02-26T22:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0336",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/fuulof/CVE/issues/1",
          "name" : "https://github.com/fuulof/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Mitigation", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290823",
          "name" : "VDB-290823 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290823",
          "name" : "VDB-290823 | Codezips Project Management System teacher.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475493",
          "name" : "Submit #475493 | Project Management System In PHP And MYSQL With Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Project Management System 1.0. It has been classified as critical. This affects an unknown part of the file /pages/forms/teacher.php. The manipulation of the argument name leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:project_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T07:15Z",
    "lastModifiedDate" : "2025-02-21T22:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0337",
        "ASSIGNER" : "psirt@servicenow.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1948695",
          "name" : "https://support.servicenow.com/kb?id=kb_article_view&sysparm_article=KB1948695",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ServiceNow has addressed an authorization bypass vulnerability that was identified in the Washington release of the Now Platform. This vulnerability, if exploited, potentially could enable an authenticated user to access unauthorized data stored within the Now Platform that the user otherwise would not be entitled to access. \n\nThis issue is addressed in the listed patches and family release, which have been made available to hosted and self-hosted customers, as well as partners."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-06T17:15Z",
    "lastModifiedDate" : "2025-03-06T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0339",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290826",
          "name" : "VDB-290826 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290826",
          "name" : "VDB-290826 | code-projects Online Bike Rental HTTP GET Request vehical-details.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475731",
          "name" : "Submit #475731 | code-projects Online Bike Rental 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in code-projects Online Bike Rental 1.0. Affected is an unknown function of the file /vehical-details.php of the component HTTP GET Request Handler. The manipulation leads to cross site scripting. It is possible to launch the attack remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:online_bike_rental_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-09T07:15Z",
    "lastModifiedDate" : "2025-03-03T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0340",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290827",
          "name" : "VDB-290827 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290827",
          "name" : "VDB-290827 | code-projects Cinema Seat Reservation System deleteBooking.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.476707",
          "name" : "Submit #476707 | code projects Cinema Seat Reservation System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Cinema Seat Reservation System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/deleteBooking.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:cinema_seat_reservation_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T07:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0341",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/Remote%20Code%20Execution%20via%20Arbitrary%20File%20Upload%20in%20Computer%20Laboratory%20Management%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/Remote%20Code%20Execution%20via%20Arbitrary%20File%20Upload%20in%20Computer%20Laboratory%20Management%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290828",
          "name" : "VDB-290828 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290828",
          "name" : "VDB-290828 | CampCodes Computer Laboratory Management System edit unrestricted upload",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.476884",
          "name" : "Submit #476884 | CampCodes Computer Laboratory Management System 1.0 RCE via Arbitrary File Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in CampCodes Computer Laboratory Management System 1.0. Affected by this issue is some unknown functionality of the file /class/edit/edit. The manipulation of the argument e_photo leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T08:15Z",
    "lastModifiedDate" : "2025-03-04T19:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0342",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Computer%20Laboratory%20Management%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20Computer%20Laboratory%20Management%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290829",
          "name" : "VDB-290829 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290829",
          "name" : "VDB-290829 | CampCodes Computer Laboratory Management System edit cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.476897",
          "name" : "Submit #476897 | CampCodes Computer Laboratory Management System 1.0 Stored Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in CampCodes Computer Laboratory Management System 1.0. This affects an unknown part of the file /class/edit/edit. The manipulation of the argument s_lname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:computer_laboratory_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-09T08:15Z",
    "lastModifiedDate" : "2025-03-03T17:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0343",
        "ASSIGNER" : "cve@forums.swift.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/apple/swift-asn1/security/advisories/GHSA-w8xv-rwgf-4fwh",
          "name" : "https://github.com/apple/swift-asn1/security/advisories/GHSA-w8xv-rwgf-4fwh",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Swift ASN.1 can be caused to crash when parsing certain BER/DER constructions. This crash is caused by a confusion in the ASN.1 library itself which assumes that certain objects can only be provided in either constructed or primitive forms, and will trigger a preconditionFailure if that constraint isn't met.\n\nImportantly, these constraints are actually required to be true in DER, but that correctness wasn't enforced on the early node parser side so it was incorrect to rely on it later on in decoding, which is what the library did.\n\nThese crashes can be triggered when parsing any DER/BER format object. There is no memory-safety issue here: the crash is a graceful one from the Swift runtime. The impact of this is that it can be used as a denial-of-service vector when parsing BER/DER data from unknown sources, e.g. when parsing TLS certificates."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T01:15Z",
    "lastModifiedDate" : "2025-03-24T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0344",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli3.md",
          "name" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli3.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290857",
          "name" : "VDB-290857 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290857",
          "name" : "VDB-290857 | leiyuxi cy-fast listData sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475747",
          "name" : "Submit #475747 | cy-fast 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this vulnerability is the function listData of the file /commpara/listData. The manipulation of the argument order leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T08:15Z",
    "lastModifiedDate" : "2025-01-09T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0345",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli4.md",
          "name" : "https://github.com/d3do-23/cvelist/blob/main/cy-fast/sqli4.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290858",
          "name" : "VDB-290858 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.290858",
          "name" : "VDB-290858 | leiyuxi cy-fast listData sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475748",
          "name" : "Submit #475748 | cy-fast 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in leiyuxi cy-fast 1.0 and classified as critical. Affected by this issue is the function listData of the file /sys/menu/listData. The manipulation of the argument order leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T09:15Z",
    "lastModifiedDate" : "2025-01-09T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0346",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/Lytes/266e5fa6eb4506fe2c7e35166664249a",
          "name" : "https://gist.github.com/Lytes/266e5fa6eb4506fe2c7e35166664249a",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290859",
          "name" : "VDB-290859 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290859",
          "name" : "VDB-290859 | code-projects Content Management System Publish News Page publishnews.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.476728",
          "name" : "Submit #476728 | code-projects CONTENT MANAGEMENT SYSTEM, News-Buzz 1.0 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Content Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/publishnews.php of the component Publish News Page. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:content_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T09:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0347",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Curious-L/-/issues/3",
          "name" : "https://github.com/Curious-L/-/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290860",
          "name" : "VDB-290860 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290860",
          "name" : "VDB-290860 | code-projects Admission Management System Login index.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.476898",
          "name" : "Submit #476898 | code-projects.org Admission Management System V1.0 sql",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Admission Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file index.php of the component Login. The manipulation of the argument u_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:admission_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T10:15Z",
    "lastModifiedDate" : "2025-02-27T02:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0348",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20DepEd%20Equipment%20Inventory%20System.md",
          "name" : "https://github.com/shaturo1337/POCs/blob/main/Stored%20XSS%20Vulnerability%20in%20DepEd%20Equipment%20Inventory%20System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290861",
          "name" : "VDB-290861 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290861",
          "name" : "VDB-290861 | CampCodes DepEd Equipment Inventory System add_employee.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.476908",
          "name" : "Submit #476908 | CampCodes DepEd Equipment Inventory System 1.0 Stored Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in CampCodes DepEd Equipment Inventory System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /data/add_employee.php. The manipulation of the argument data leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:deped_equipment_inventory_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-09T10:15Z",
    "lastModifiedDate" : "2025-05-28T17:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0349",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wy876/cve/issues/5",
          "name" : "https://github.com/wy876/cve/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.290862",
          "name" : "VDB-290862 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.290862",
          "name" : "VDB-290862 | Tenda AC6 GetParentControlInfo stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.477048",
          "name" : "Submit #477048 | tenda AC6 V15.03.05.16 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in Tenda AC6 15.03.05.16. Affected is the function GetParentControlInfo of the file /goform/GetParentControlInfo. The manipulation of the argument src/mac leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-09T11:15Z",
    "lastModifiedDate" : "2025-03-22T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0350",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wow-carousel-for-divi-lite/trunk/includes/divi4/modules/ImageCarouselChild/ImageCarouselChild.php#L327",
          "name" : "https://plugins.trac.wordpress.org/browser/wow-carousel-for-divi-lite/trunk/includes/divi4/modules/ImageCarouselChild/ImageCarouselChild.php#L327",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wow-carousel-for-divi-lite/trunk/includes/divi4/modules/LogoCarouselChild/LogoCarouselChild.php#L168",
          "name" : "https://plugins.trac.wordpress.org/browser/wow-carousel-for-divi-lite/trunk/includes/divi4/modules/LogoCarouselChild/LogoCarouselChild.php#L168",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3226742/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3226742/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/wow-carousel-for-divi-lite/#developers",
          "name" : "https://wordpress.org/plugins/wow-carousel-for-divi-lite/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e57a85b-3ea8-46df-ab60-ce835268b1f6?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9e57a85b-3ea8-46df-ab60-ce835268b1f6?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Divi Carousel Maker – Image, Logo, Testimonial, Post Carousel & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Carousel and Logo Carousel in all versions up to, and including, 2.0.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:elegantthemes:carousel_maker_for_divi:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-25T10:15Z",
    "lastModifiedDate" : "2025-02-04T20:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0352",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-051-05",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-051-05",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.rrms.com/contact-us/",
          "name" : "https://www.rrms.com/contact-us/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rapid Response Monitoring My Security Account App utilizes an API that could be exploited by an attacker to modify request data, potentially causing the API to return information about other users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T20:15Z",
    "lastModifiedDate" : "2025-02-20T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0353",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/FlipBox/FlipBox.php#L1053",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/FlipBox/FlipBox.php#L1053",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/GradientHeading/GradientHeading.php#L344",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/GradientHeading/GradientHeading.php#L344",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/ImageCarouselChild/ImageCarouselChild.php#L507",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/ImageCarouselChild/ImageCarouselChild.php#L507",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InfoBox/InfoBox.php#L852",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InfoBox/InfoBox.php#L852",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InfoCard/InfoCard.php#L688",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InfoCard/InfoCard.php#L688",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InlineNotice/InlineNotice.php#L486",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/InlineNotice/InlineNotice.php#L486",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/LogoCarouselChild/LogoCarouselChild.php#L177",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/LogoCarouselChild/LogoCarouselChild.php#L177",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/LogoGridChild/LogoGridChild.php#L193",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/LogoGridChild/LogoGridChild.php#L193",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/Review/Review.php#L703",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/Review/Review.php#L703",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/ScrollImage/ScrollImage.php#L388",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/ScrollImage/ScrollImage.php#L388",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/Testimonial/Testimonial.php#L1147",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/Testimonial/Testimonial.php#L1147",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/VideoModal/VideoModal.php#L593",
          "name" : "https://plugins.trac.wordpress.org/browser/addons-for-divi/trunk/includes/modules/divi-4/VideoModal/VideoModal.php#L593",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3230743/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3230743/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/addons-for-divi/#developers",
          "name" : "https://wordpress.org/plugins/addons-for-divi/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d5810757-1866-4788-809f-2c68e16a5156?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d5810757-1866-4788-809f-2c68e16a5156?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Divi Torque Lite – Best Divi Addon, Extensions, Modules & Social Modules plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 4.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T12:15Z",
    "lastModifiedDate" : "2025-01-29T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0354",
        "ASSIGNER" : "psirt-info@cyber.jp.nec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jpn.nec.com/security-info/secinfo/nv25-003_en.html",
          "name" : "https://jpn.nec.com/security-info/secinfo/nv25-003_en.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-site scripting vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to inject an arbitrary script via the network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T08:15Z",
    "lastModifiedDate" : "2025-02-17T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0355",
        "ASSIGNER" : "psirt-info@cyber.jp.nec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jpn.nec.com/security-info/secinfo/nv25-003_en.html",
          "name" : "https://jpn.nec.com/security-info/secinfo/nv25-003_en.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authentication for Critical Function vulnerability in NEC Corporation Aterm WG2600HS Ver.1.7.2 and earlier, WF1200CRS Ver.1.6.0 and earlier, WG1200CRS Ver.1.5.0 and earlier, GB1200PE Ver.1.3.0 and earlier, WG2600HP4 Ver.1.4.2 and earlier, WG2600HM4 Ver.1.4.2 and earlier, WG2600HS2 Ver.1.3.2 and earlier, WX3000HP Ver.2.4.2 and earlier and WX4200D5 Ver.1.2.4 and earlier allows a attacker to get a Wi-Fi password via the network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T08:15Z",
    "lastModifiedDate" : "2025-01-21T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0356",
        "ASSIGNER" : "psirt-info@cyber.jp.nec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jpn.nec.com/security-info/secinfo/nv25-003_en.html",
          "name" : "https://jpn.nec.com/security-info/secinfo/nv25-003_en.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NEC Corporation Aterm WX1500HP Ver.1.4.2 and earlier and WX3600HP Ver.1.5.3 and earlier allows a attacker to execute arbitrary OS commands via the network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T08:15Z",
    "lastModifiedDate" : "2025-02-17T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0357",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.iqonic.design/wpbookit/versions/change-log",
          "name" : "https://documentation.iqonic.design/wpbookit/versions/change-log",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/19bf7a68-e76d-4740-9f35-b6084094f59b?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPBookit plugin for WordPress is vulnerable to arbitrary file uploads due to insufficient file type validation in the 'WPB_Profile_controller::handle_image_upload' function in versions up to, and including, 1.6.9. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:iqonic:wpbookit:*:*:*:*:pro:wordpress:*:*",
          "versionEndExcluding" : "1.6.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-25T02:15Z",
    "lastModifiedDate" : "2025-06-27T17:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0358",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/35/90/85/cve-2025-0358pdf-en-US-483809.pdf",
          "name" : "https://www.axis.com/dam/public/35/90/85/cve-2025-0358pdf-en-US-483809.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed a privilege escalation, enabling a lower-privileged user to gain administrator privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T08:15Z",
    "lastModifiedDate" : "2025-06-02T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0359",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/68/08/c5/cve-2025-0359pdf-en-US-466885.pdf",
          "name" : "https://www.axis.com/dam/public/68/08/c5/cve-2025-0359pdf-en-US-466885.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the ACAP Application framework that allowed applications to access restricted D-Bus methods within the framework. \nAxis has released patched AXIS OS versions for the highlighted flaw. Please refer to the Axis security advisory for more information and solution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T06:15Z",
    "lastModifiedDate" : "2025-03-04T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0360",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/b1/fe/46/cve-2025-0360pdf-en-US-466887.pdf",
          "name" : "https://www.axis.com/dam/public/b1/fe/46/cve-2025-0360pdf-en-US-466887.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "During an annual penetration test conducted on behalf of Axis Communication, Truesec discovered a flaw in the VAPIX Device Configuration framework that could lead to an incorrect user privilege level in the VAPIX service account D-Bus API."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T06:15Z",
    "lastModifiedDate" : "2025-03-04T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0361",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/f4/9b/13/cve-2025-0361pdf-en-US-474511.pdf",
          "name" : "https://www.axis.com/dam/public/f4/9b/13/cve-2025-0361pdf-en-US-474511.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "During an annual penetration test conducted on behalf of Axis Communications, Truesec discovered a flaw in the VAPIX Device Configuration framework that allowed for unauthenticated username enumeration through the VAPIX Device Configuration SSH Management API."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-08T06:15Z",
    "lastModifiedDate" : "2025-04-08T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0362",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1021"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/512425",
          "name" : "GitLab Issue #512425",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2926425",
          "name" : "HackerOne Bug Bounty Report #2926425",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 7.7 before 17.8.7, 17.9 before 17.9.6, and 17.10 before 17.10.4. Under certain conditions, an attacker could potentially trick users into unintentionally authorizing sensitive actions on their behalf."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "7.7.0",
          "versionEndExcluding" : "17.8.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "7.7.0",
          "versionEndExcluding" : "17.8.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-10T15:16Z",
    "lastModifiedDate" : "2025-08-07T18:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0364",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vulncheck-oss/cve-2025-0364",
          "name" : "https://github.com/vulncheck-oss/cve-2025-0364",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vulncheck.com/advisories/big-ant-upload-rce",
          "name" : "https://vulncheck.com/advisories/big-ant-upload-rce",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "BigAntSoft BigAnt Server, up to and including version 5.6.06, is vulnerable to unauthenticated remote code execution via account registration. An unauthenticated remote attacker can create an administrative user through the default exposed SaaS registration mechanism. Once an administrator, the attacker can upload and execute arbitrary PHP code using the \"Cloud Storage Addin,\" leading to unauthenticated code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T18:15Z",
    "lastModifiedDate" : "2025-02-28T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0365",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/inline-svg/widgets/inline-svg.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/inline-svg/widgets/inline-svg.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bc5ef7-6825-463f-a3ce-d6ab1fc0e030?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3bc5ef7-6825-463f-a3ce-d6ab1fc0e030?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Jupiter X Core plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 4.8.7 via the inline SVG feature. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.8.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-01T06:15Z",
    "lastModifiedDate" : "2025-02-24T15:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0366",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/forms/classes/ajax-handler.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/video/widgets/video.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3231122/jupiterx-core/trunk/includes/extensions/raven/includes/modules/video/widgets/video.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a20dc1d-eb7c-47ac-ad9a-ec4c0d5db62e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a20dc1d-eb7c-47ac-ad9a-ec4c0d5db62e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Jupiter X Core plugin for WordPress is vulnerable to Local File Inclusion to Remote Code Execution in all versions up to, and including, 4.8.7 via the get_svg() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution. In this specific case,  an attacker can create a form that allows SVG uploads, upload an SVG file with malicious content and then include the SVG file in a post to achieve remote code execution. This means it is relatively easy to gain remote code execution as a contributor-level user and above by default."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:artbees:jupiter_x_core:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.8.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T06:15Z",
    "lastModifiedDate" : "2025-02-24T15:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0367",
        "ASSIGNER" : "prodsec@splunk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisory.splunk.com/advisories/SVD-2025-0103",
          "name" : "https://advisory.splunk.com/advisories/SVD-2025-0103",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In versions 3.1.0 and lower of the Splunk Supporting Add-on for Active Directory, also known as SA-ldapsearch, a vulnerable regular expression pattern could lead to a Regular Expression Denial of Service (ReDoS) attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T17:15Z",
    "lastModifiedDate" : "2025-01-30T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0368",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/6a4f7097-082b-4375-9582-945928d765b8/",
          "name" : "https://wpscan.com/vulnerability/6a4f7097-082b-4375-9582-945928d765b8/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Banner Garden Plugin for WordPress plugin through 0.1.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin or unauthenticated users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:karacsi_maci:banner_garden:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "0.1.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T06:15Z",
    "lastModifiedDate" : "2025-05-07T18:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0369",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://crocoblock.com/changelog/",
          "name" : "https://crocoblock.com/changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://crocoblock.com/plugins/jetengine/",
          "name" : "https://crocoblock.com/plugins/jetengine/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f27979a8-0e68-4a45-9e3e-3667d88361d8?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f27979a8-0e68-4a45-9e3e-3667d88361d8?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The JetEngine plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘list_tag’ parameter in all versions up to, and including, 3.6.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-18T07:15Z",
    "lastModifiedDate" : "2025-01-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0370",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/lightbox.php#L75",
          "name" : "https://plugins.trac.wordpress.org/browser/shortcodes-ultimate/trunk/includes/shortcodes/lightbox.php#L75",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3229060/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3229060/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/shortcodes-ultimate/#developers",
          "name" : "https://wordpress.org/plugins/shortcodes-ultimate/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0869c35-9ea8-46a5-8bba-23d7ef47355a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f0869c35-9ea8-46a5-8bba-23d7ef47355a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Shortcodes Plugin — Shortcodes Ultimate plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘src’ parameter in all versions up to, and including, 7.3.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vanokhin:shortcodes_ultimate:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "7.3.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T10:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0371",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://crocoblock.com/changelog/",
          "name" : "https://crocoblock.com/changelog/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ded2f366-375c-4cf6-9cbd-c969a3b3d6d5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ded2f366-375c-4cf6-9cbd-c969a3b3d6d5?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The JetElements plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 2.7.2.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:crocoblock:jetelements:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.7.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-21T09:15Z",
    "lastModifiedDate" : "2025-01-31T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0372",
        "ASSIGNER" : "security@hypr.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.hypr.com/trust-center/security-advisories",
          "name" : "https://www.hypr.com/trust-center/security-advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition') vulnerability in HYPR Passwordless on Windows allows Privilege Escalation.This issue affects HYPR Passwordless: before 10.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T17:15Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0373",
        "ASSIGNER" : "secteam@freebsd.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.freebsd.org/advisories/FreeBSD-SA-25:02.fs.asc",
          "name" : "https://security.freebsd.org/advisories/FreeBSD-SA-25:02.fs.asc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250207-0009/",
          "name" : "https://security.netapp.com/advisory/ntap-20250207-0009/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On 64-bit systems, the implementation of VOP_VPTOFH() in the cd9660, tarfs and ext2fs filesystems overflows the destination FID buffer by 4 bytes, a stack buffer overflow.\n\nA NFS server that exports a cd9660, tarfs, or ext2fs file system can be made to panic by mounting and accessing the export with an NFS client.  Further exploitation (e.g., bypassing file permission checking or remote kernel code execution) is potentially possible, though this has not been demonstrated.  In particular, release kernels are compiled with stack protection enabled, and some instances of the overflow are caught by this mechanism, causing a panic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T05:15Z",
    "lastModifiedDate" : "2025-02-07T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0374",
        "ASSIGNER" : "secteam@freebsd.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.freebsd.org/advisories/FreeBSD-SA-25:03.etcupdate.asc",
          "name" : "https://security.freebsd.org/advisories/FreeBSD-SA-25:03.etcupdate.asc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250207-0007/",
          "name" : "https://security.netapp.com/advisory/ntap-20250207-0007/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When etcupdate encounters conflicts while merging files, it saves a version containing conflict markers in /var/db/etcupdate/conflicts.  This version does not preserve the mode of the input file, and is world-readable.  This applies to files that would normally have restricted visibility, such as /etc/master.passwd.\n\nAn unprivileged local user may be able to read encrypted root and user passwords from the temporary master.passwd file created in /var/db/etcupdate/conflicts.  This is possible only when conflicts within the password file arise during an update, and the unprotected file is deleted when conflicts are resolved."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T05:15Z",
    "lastModifiedDate" : "2025-02-07T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0376",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/512603",
          "name" : "GitLab Issue #512603",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2930243",
          "name" : "HackerOne Bug Bounty Report #2930243",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An XSS vulnerability exists in GitLab CE/EE affecting all versions from 13.3 prior to 17.6.5, 17.7 prior to 17.7.4 and 17.8 prior to 17.8.2 that allows an attacker to execute unauthorized actions via a change page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "13.3.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "13.3.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T15:15Z",
    "lastModifiedDate" : "2025-08-06T18:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0377",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-01-hashicorp-go-slug-vulnerable-to-zip-slip-attack",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-01-hashicorp-go-slug-vulnerable-to-zip-slip-attack",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HashiCorp’s go-slug library is vulnerable to a zip-slip style attack when a non-existing user-provided path is extracted from the tar entry."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-21T16:15Z",
    "lastModifiedDate" : "2025-01-21T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0390",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          }, {
            "lang" : "en",
            "value" : "CWE-24"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKBM",
          "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKBM",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291124",
          "name" : "VDB-291124 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291124",
          "name" : "VDB-291124 | Guangzhou Huayi Intelligent Technology Jeewms wmOmNoticeHController.do path traversal",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This vulnerability affects unknown code of the file /wmOmNoticeHController.do. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T08:15Z",
    "lastModifiedDate" : "2025-01-11T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0391",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKA8",
          "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IBFKA8",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291125",
          "name" : "VDB-291125 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291125",
          "name" : "VDB-291125 | Guangzhou Huayi Intelligent Technology Jeewms CgFormBuildController. java saveOrUpdate sql injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. This issue affects the function saveOrUpdate of the file org/jeecgframework/web/cgform/controller/build/CgFormBuildController. java. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T09:15Z",
    "lastModifiedDate" : "2025-01-11T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0392",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IBFK93",
          "name" : "https://gitee.com/erzhongxmu/JEEWMS/issues/IBFK93",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291126",
          "name" : "VDB-291126 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291126",
          "name" : "VDB-291126 | Guangzhou Huayi Intelligent Technology Jeewms graphReportController.do datagridGraph sql injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Guangzhou Huayi Intelligent Technology Jeewms up to 20241229. Affected is the function datagridGraph of the file /graphReportController.do. The manipulation of the argument store_code leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 20250101 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-11T11:15Z",
    "lastModifiedDate" : "2025-01-11T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0393",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L1260",
          "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L1260",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L391",
          "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1006/classes/modules/wpr-filter-grid-posts.php#L391",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3220959/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3220959/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/royal-elementor-addons/#developers",
          "name" : "https://wordpress.org/plugins/royal-elementor-addons/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e34c05-7431-4acd-91f3-aab5e66f61ad?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a8e34c05-7431-4acd-91f3-aab5e66f61ad?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.1006. This is due to missing or incorrect nonce validation on the wpr_filter_grid_posts() function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.7.1006",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-14T09:15Z",
    "lastModifiedDate" : "2025-03-03T18:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0394",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/groundhogg/tags/3.7.3.5/includes/big-file-uploader.php#L117",
          "name" : "https://plugins.trac.wordpress.org/browser/groundhogg/tags/3.7.3.5/includes/big-file-uploader.php#L117",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3221208/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3221208/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/groundhogg/#developers",
          "name" : "https://wordpress.org/plugins/groundhogg/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2cf3b85-2e2d-43dc-9877-9a740d4fd2fb?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b2cf3b85-2e2d-43dc-9877-9a740d4fd2fb?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WordPress CRM, Email & Marketing Automation for WordPress | Award Winner — Groundhogg plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the gh_big_file_upload() function in all versions up to, and including, 3.7.3.5. This makes it possible for authenticated attackers, with Author-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-14T09:15Z",
    "lastModifiedDate" : "2025-01-14T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0395",
        "ASSIGNER" : "glibc-cna@sourceware.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/01/22/4",
          "name" : "http://www.openwall.com/lists/oss-security/2025/01/22/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/01/23/2",
          "name" : "http://www.openwall.com/lists/oss-security/2025/01/23/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/04/13/1",
          "name" : "http://www.openwall.com/lists/oss-security/2025/04/13/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/04/24/7",
          "name" : "http://www.openwall.com/lists/oss-security/2025/04/24/7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250228-0006/",
          "name" : "https://security.netapp.com/advisory/ntap-20250228-0006/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32582",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32582",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001",
          "name" : "https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/pipermail/libc-announce/2025/000044.html",
          "name" : "https://sourceware.org/pipermail/libc-announce/2025/000044.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.openwall.com/lists/oss-security/2025/01/22/4",
          "name" : "https://www.openwall.com/lists/oss-security/2025/01/22/4",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T13:15Z",
    "lastModifiedDate" : "2025-04-30T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0396",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/exelban/stats/releases/tag/v2.11.22",
          "name" : "https://github.com/exelban/stats/releases/tag/v2.11.22",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291269",
          "name" : "VDB-291269 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291269",
          "name" : "VDB-291269 | exelban stats XPC Service shouldAcceptNewConnection command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473229",
          "name" : "Submit #473229 | https://github.com/exelban Stats < v2.11.22 Local Privilege Escalation",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://winslow1984.com/books/cve-collection/page/stats-v21122-local-privilege-escalation",
          "name" : "https://winslow1984.com/books/cve-collection/page/stats-v21122-local-privilege-escalation",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in exelban stats up to 2.11.21. This issue affects the function shouldAcceptNewConnection of the component XPC Service. The manipulation leads to command injection. It is possible to launch the attack on the local host. Upgrading to version 2.11.22 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-12T12:15Z",
    "lastModifiedDate" : "2025-01-12T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0397",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LvZCh/SPPanAdmin/issues/3",
          "name" : "https://github.com/LvZCh/SPPanAdmin/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/LvZCh/SPPanAdmin/issues/3#issue-2765450314",
          "name" : "https://github.com/LvZCh/SPPanAdmin/issues/3#issue-2765450314",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291270",
          "name" : "VDB-291270 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291270",
          "name" : "VDB-291270 | reckcn SPPanAdmin edit cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473287",
          "name" : "Submit #473287 | reckcn SPPanAdmin 1.0 storage type XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in reckcn SPPanAdmin 1.0. Affected is an unknown function of the file /;/admin/role/edit. The manipulation of the argument name leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-12T13:15Z",
    "lastModifiedDate" : "2025-01-12T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0398",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/longpi1/warehouse/issues/4",
          "name" : "https://github.com/longpi1/warehouse/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/longpi1/warehouse/issues/4#issue-2765524047",
          "name" : "https://github.com/longpi1/warehouse/issues/4#issue-2765524047",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291271",
          "name" : "VDB-291271 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291271",
          "name" : "VDB-291271 | longpi1 warehouse Backend updateInport cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473316",
          "name" : "Submit #473316 | longpi1 warehouse 1.0 storage XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in longpi1 warehouse 1.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /resources/..;/inport/updateInport of the component Backend. The manipulation of the argument remark leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-12T14:15Z",
    "lastModifiedDate" : "2025-01-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0399",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StarSea99/starsea-mall/issues/3",
          "name" : "https://github.com/StarSea99/starsea-mall/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/StarSea99/starsea-mall/issues/3#issue-2765550309",
          "name" : "https://github.com/StarSea99/starsea-mall/issues/3#issue-2765550309",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291274",
          "name" : "VDB-291274 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291274",
          "name" : "VDB-291274 | StarSea99 starsea-mall uploadController.java UploadController unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473319",
          "name" : "Submit #473319 | StarSea99 starsea-mall 1.0 any file uploaded",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been declared as critical. This vulnerability affects the function UploadController of the file src/main/java/com/siro/mall/controller/common/uploadController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-12T23:15Z",
    "lastModifiedDate" : "2025-01-12T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0400",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/StarSea99/starsea-mall/issues/5",
          "name" : "https://github.com/StarSea99/starsea-mall/issues/5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/StarSea99/starsea-mall/issues/5#issue-2765562635",
          "name" : "https://github.com/StarSea99/starsea-mall/issues/5#issue-2765562635",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291275",
          "name" : "VDB-291275 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291275",
          "name" : "VDB-291275 | StarSea99 starsea-mall update cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473321",
          "name" : "Submit #473321 | StarSea99 starsea-mall 1.0 Storage XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in StarSea99 starsea-mall 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /admin/categories/update. The manipulation of the argument categoryName leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-12T23:15Z",
    "lastModifiedDate" : "2025-01-12T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0401",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/1902756969/reggie/issues/1",
          "name" : "https://github.com/1902756969/reggie/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/1902756969/reggie/issues/1#issue-2765577260",
          "name" : "https://github.com/1902756969/reggie/issues/1#issue-2765577260",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291276",
          "name" : "VDB-291276 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291276",
          "name" : "VDB-291276 | 1902756969 reggie CommonController.java download path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473322",
          "name" : "Submit #473322 | 1902756969 reggie 1.0 Read any file",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in 1902756969 reggie 1.0. Affected is the function download of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument name leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-13T00:15Z",
    "lastModifiedDate" : "2025-01-13T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0402",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/1902756969/reggie/issues/2",
          "name" : "https://github.com/1902756969/reggie/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/1902756969/reggie/issues/2#issue-2765582342",
          "name" : "https://github.com/1902756969/reggie/issues/2#issue-2765582342",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291277",
          "name" : "VDB-291277 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291277",
          "name" : "VDB-291277 | 1902756969 reggie CommonController.java upload unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473324",
          "name" : "Submit #473324 | 1902756969 reggie 1.0 any file uploaded",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in 1902756969 reggie 1.0. Affected by this vulnerability is the function upload of the file src/main/java/com/itheima/reggie/controller/CommonController.java. The manipulation of the argument file leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-13T00:15Z",
    "lastModifiedDate" : "2025-01-13T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0403",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/1902756969/reggie/issues/3",
          "name" : "https://github.com/1902756969/reggie/issues/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/1902756969/reggie/issues/3#issue-2765587336",
          "name" : "https://github.com/1902756969/reggie/issues/3#issue-2765587336",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291278",
          "name" : "VDB-291278 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291278",
          "name" : "VDB-291278 | 1902756969 reggie Phone Number Validation sendMsg information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473325",
          "name" : "Submit #473325 | 1902756969 reggie 1.0 any user login",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in 1902756969 reggie 1.0. Affected by this issue is some unknown functionality of the file /user/sendMsg of the component Phone Number Validation Handler. The manipulation of the argument code leads to information disclosure. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-13T00:15Z",
    "lastModifiedDate" : "2025-01-13T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0404",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/2",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/2#issue-2765760967",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/2#issue-2765760967",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291280",
          "name" : "VDB-291280 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291280",
          "name" : "VDB-291280 | liujianview gymxmjpa CoachController.java CoachController sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473385",
          "name" : "Submit #473385 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in liujianview gymxmjpa 1.0 and classified as critical. This vulnerability affects the function CoachController of the file src/main/java/com/liujian/gymxmjpa/controller/CoachController.java. The manipulation of the argument coachName leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-13T01:15Z",
    "lastModifiedDate" : "2025-01-13T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0405",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/3",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/3",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/3#issue-2765770918",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291281",
          "name" : "VDB-291281 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291281",
          "name" : "VDB-291281 | liujianview gymxmjpa GoodsController.java GoodsDaoImpl sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473411",
          "name" : "Submit #473411 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in liujianview gymxmjpa 1.0 and classified as critical. This issue affects the function GoodsDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/GoodsController.java. The manipulation of the argument goodsName leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-13T01:15Z",
    "lastModifiedDate" : "2025-05-05T15:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0406",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/5",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/5",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/5#issue-2765786069",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291282",
          "name" : "VDB-291282 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291282",
          "name" : "VDB-291282 | liujianview gymxmjpa SubjectController.java SubjectDaoImpl sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473417",
          "name" : "Submit #473417 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in liujianview gymxmjpa 1.0. It has been classified as critical. Affected is the function SubjectDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/SubjectController.java. The manipulation of the argument subname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-13T02:15Z",
    "lastModifiedDate" : "2025-05-05T15:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0407",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/7",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/7",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/7#issue-2765800789",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/7#issue-2765800789",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/7#issue-2765800789",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/7#issue-2765800789",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291283",
          "name" : "VDB-291283 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291283",
          "name" : "VDB-291283 | liujianview gymxmjpa EquipmentController.java EquipmentDaoImpl sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473422",
          "name" : "Submit #473422 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in liujianview gymxmjpa 1.0. It has been declared as critical. Affected by this vulnerability is the function EquipmentDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/EquipmentController.java. The manipulation of the argument hyname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-13T02:15Z",
    "lastModifiedDate" : "2025-05-05T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0408",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/8",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/8",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/8#issue-2765807702",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/8#issue-2765807702",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/8#issue-2765807702",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/8#issue-2765807702",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291284",
          "name" : "VDB-291284 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291284",
          "name" : "VDB-291284 | liujianview gymxmjpa LoosController.java LoosDaoImpl sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473423",
          "name" : "Submit #473423 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in liujianview gymxmjpa 1.0. It has been rated as critical. Affected by this issue is the function LoosDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/LoosController.java. The manipulation of the argument loosName leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-13T02:15Z",
    "lastModifiedDate" : "2025-05-05T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0409",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/9",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/9",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/9#issue-2765816110",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/9#issue-2765816110",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/9#issue-2765816110",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/9#issue-2765816110",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291285",
          "name" : "VDB-291285 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291285",
          "name" : "VDB-291285 | liujianview gymxmjpa MembertypeController.java MembertypeDaoImpl sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473425",
          "name" : "Submit #473425 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in liujianview gymxmjpa 1.0. This affects the function MembertypeDaoImpl of the file src/main/java/com/liujian/gymxmjpa/controller/MembertypeController.java. The manipulation of the argument typeName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-13T03:15Z",
    "lastModifiedDate" : "2025-05-05T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0410",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/10",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/10",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/10",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/10",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/10#issue-2765824571",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/10#issue-2765824571",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/liujianview/gymxmjpa/issues/10#issue-2765824571",
          "name" : "https://github.com/liujianview/gymxmjpa/issues/10#issue-2765824571",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291286",
          "name" : "VDB-291286 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291286",
          "name" : "VDB-291286 | liujianview gymxmjpa MenberConntroller.java MenberDaoInpl sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.473426",
          "name" : "Submit #473426 | liujianview gymxmjpa 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in liujianview gymxmjpa 1.0. This vulnerability affects the function MenberDaoInpl of the file src/main/java/com/liujian/gymxmjpa/controller/MenberConntroller.java. The manipulation of the argument hyname leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:liujianview:gymxmjpa:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-13T03:15Z",
    "lastModifiedDate" : "2025-05-05T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0411",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/01/24/6",
          "name" : "http://www.openwall.com/lists/oss-security/2025/01/24/6",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250207-0005/",
          "name" : "https://security.netapp.com/advisory/ntap-20250207-0005/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability",
          "name" : "https://www.vicarius.io/vsociety/posts/cve-2025-0411-7-zip-mitigation-vulnerability",
          "refsource" : "",
          "tags" : [ "Mitigation" ]
        }, {
          "url" : "https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability",
          "name" : "https://www.vicarius.io/vsociety/posts/cve-2025-0411-detection-7-zip-vulnerability",
          "refsource" : "",
          "tags" : [ "Mitigation" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-045/",
          "name" : "ZDI-25-045",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "7-Zip Mark-of-the-Web Bypass Vulnerability. This vulnerability allows remote attackers to bypass the Mark-of-the-Web protection mechanism on affected installations of 7-Zip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of archived files. When extracting files from a crafted archive that bears the Mark-of-the-Web, 7-Zip does not propagate the Mark-of-the-Web to the extracted files. An attacker can leverage this vulnerability to execute arbitrary code in the context of the current user. Was ZDI-CAN-25456."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:7-zip:7-zip:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "24.09",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-25T05:15Z",
    "lastModifiedDate" : "2025-02-12T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0412",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.keyshot.com/cert/lsa-960930/lsa-960930.pdf?version=1.0",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-23-1716/",
          "name" : "ZDI-23-1716",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Luxion KeyShot Viewer KSP File Parsing Memory Corruption Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the processing of KSP files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-22139."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2023.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-13T04:15Z",
    "lastModifiedDate" : "2025-08-07T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0413",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-59"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://kb.parallels.com/130212",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-082/",
          "name" : "ZDI-25-082",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Parallels Desktop Technical Data Reporter Link Following Local Privilege Escalation Vulnerability. \nThis vulnerability allows local attackers to escalate privileges on affected installations of Parallels Desktop. An attacker must first obtain the ability to execute low-privileged code on the target host system in order to exploit this vulnerability.\n\nThe specific flaw exists within the Technical Data Reporter component. By creating a symbolic link, an attacker can abuse the service to change the permissions of arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of root. Was ZDI-CAN-25014."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:parallels:remote_application_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "19.4.3.2-25228",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:parallels:parallels:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "19.0-23304",
          "versionEndExcluding" : "19.4.3-25221",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:parallels:parallels:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "20.0-25389",
          "versionEndExcluding" : "20.2-25889",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T00:15Z",
    "lastModifiedDate" : "2025-08-15T12:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0415",
        "ASSIGNER" : "psirt@moxa.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-259491-cve-2025-0415-command-injection-leading-to-denial-of-service-(dos)",
          "name" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-259491-cve-2025-0415-command-injection-leading-to-denial-of-service-(dos)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A remote attacker with web administrator privileges can exploit the device’s web interface to execute arbitrary system commands through the NTP settings. Successful exploitation may result in the device entering an infinite reboot loop, leading to a total or partial denial of connectivity for downstream systems that rely on its network services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-02T07:15Z",
    "lastModifiedDate" : "2025-04-02T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0416",
        "ASSIGNER" : "vulncoord@ncsc.fi"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0416/",
          "name" : "https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0416/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Local privilege escalation through insecure DCOM configuration in Valmet DNA versions prior to C2023. The DCOM object Valmet DNA Engineering has permissions that allow it to run commands as a user with the SeImpersonatePrivilege privilege. The SeImpersonatePrivilege privilege is a Windows permission that allows a process to impersonate another user. An attacker can use this vulnerability to escalate their privileges and take complete control of the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-01T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0417",
        "ASSIGNER" : "vulncoord@ncsc.fi"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0417/",
          "name" : "https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0417/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Lack of protection against brute force attacks in Valmet DNA visualization in DNA Operate. The possibility to make an arbitrary number of login attempts without any rate limit gives an attacker an increased chance of guessing passwords and then performing switching operations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-01T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0418",
        "ASSIGNER" : "vulncoord@ncsc.fi"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0418/",
          "name" : "https://www.valmet.com/about-us/about/research-and-development/vulnerabilityadvisories/cve-2025-0418/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Valmet DNA user passwords in plain text. This practice poses a security risk as attackers who gain access to local project data can read the passwords."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-01T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0422",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
          "name" : "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated user in the \"bestinformed Web\" application can execute commands on the underlying server running the application. (Remote Code Execution) For this, the user must be able to create \"ScriptVars\" with the type „script\" and preview them by, for example, creating a new \"Info\". By default, admin users have those permissions, but with the granular permission system, those permissions may be assigned to other users. An attacker is able to execute commands on the server running the \"bestinformed Web\" application if an account with the correct permissions was compromised before."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T08:15Z",
    "lastModifiedDate" : "2025-02-18T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0423",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
          "name" : "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple unauthenticated stored cross-site scripting vulnerabilities. An unauthenticated attacker is able to compromise the sessions of users on the server by injecting JavaScript code into their session using an \"Unauthenticated Stored Cross-Site Scripting\". The attacker is then able to ride the session of those users and can abuse their privileges on the \"bestinformed Web\" application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T08:15Z",
    "lastModifiedDate" : "2025-02-18T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0424",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
          "name" : "https://www.cordaware.com/changelog/en/version-6_4_0_4-release-13_02_2025.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In the \"bestinformed Web\" application, some user input was not properly sanitized. This leads to multiple authenticated stored cross-site scripting vulnerabilities. An authenticated attacker is able to compromise the sessions of other users on the server by injecting JavaScript code into their session using an \"Authenticated Stored Cross-Site Scripting\". Those other users might have more privileges than the attacker, enabling a form of horizontal movement."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T08:15Z",
    "lastModifiedDate" : "2025-02-18T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0425",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cordaware.com/changelog/en/version-6_3_8_1.html",
          "name" : "https://www.cordaware.com/changelog/en/version-6_3_8_1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Via the GUI of the \"bestinformed Infoclient\", a low-privileged user is by default able to change the server address of the \"bestinformed Server\" to which this client connects. This is dangerous as the \"bestinformed Infoclient\" runs with elevated permissions (\"nt authority\\system\"). By changing the server address to a malicious server, or a script simulating a server, the user is able to escalate his privileges by abusing certain features of the \"bestinformed Web\" server. Those features include:\n  *  Pushing of malicious update packages\n  *  Arbitrary Registry Read as \"nt authority\\system\"\n\n\nAn attacker is able to escalate his privileges to \"nt authority\\system\" on the Windows client running the \"bestinformed Infoclient\". \n\n\nThis attack is not possible if a custom configuration (\"Infoclient.ini\") containing the flags \"ShowOnTaskbar=false\" or \"DisabledItems=stPort,stAddress\" is deployed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T08:15Z",
    "lastModifiedDate" : "2025-02-18T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0426",
        "ASSIGNER" : "security@kubernetes.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/13/1",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/13/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kubernetes/kubernetes/issues/130016",
          "name" : "https://github.com/kubernetes/kubernetes/issues/130016",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8",
          "name" : "https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T16:16Z",
    "lastModifiedDate" : "2025-02-13T17:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0427",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110465/latest/",
          "name" : "https://developer.arm.com/documentation/110465/latest/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r8p0 through r49p3, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r19p0 through r49p3, from r50p0 through r53p0; Arm 5th Gen GPU Architecture Kernel Driver: from r41p0 through r49p3, from r50p0 through r53p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r41p0",
          "versionEndIncluding" : "r49p3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndIncluding" : "r53p0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndIncluding" : "r53p0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndIncluding" : "r51p0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r8p0",
          "versionEndIncluding" : "r49p3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r19p0",
          "versionEndIncluding" : "r49p3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-02T10:15Z",
    "lastModifiedDate" : "2025-05-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0428",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3224162/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3224162/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/66a3abc1-0508-4ce3-952b-7dbf3738879a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/66a3abc1-0508-4ce3-952b-7dbf3738879a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The \"AI Power: Complete AI Pack\" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_prompts function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.97",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-22T08:15Z",
    "lastModifiedDate" : "2025-01-24T20:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0429",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3224162/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3224162/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb927aba-a96d-47b9-ba35-60945ea5cfe5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bb927aba-a96d-47b9-ba35-60945ea5cfe5?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The \"AI Power: Complete AI Pack\" plugin for WordPress is vulnerable to PHP Object Injection in versions up to, and including, 1.8.96 via deserialization of untrusted input from the $form['post_content'] variable through the wpaicg_export_ai_forms() function. This allows authenticated attackers, with administrative privileges, to inject a PHP Object. No POP chain is present in the vulnerable plugin. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:aipower:aipower:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.97",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-22T08:15Z",
    "lastModifiedDate" : "2025-01-24T20:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0430",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-014-04",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-014-04",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Belledonne Communications Linphone-Desktop \n is vulnerable to a NULL Dereference vulnerability, which could allow a remote attacker to create a denial-of-service condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-17T18:15Z",
    "lastModifiedDate" : "2025-01-17T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0431",
        "ASSIGNER" : "security@proofpoint.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0001",
          "name" : "https://www.proofpoint.com/us/security/security-advisories/pfpt-sa-2025-0001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Enterprise Protection contains a vulnerability in URL rewriting that allows an unauthenticated remote attacker to send an email which bypasses URL protections impacting the integrity of recipient's email.  This occurs due to improper filtering of backslashes within URLs and affects all versions of 8.21, 8.20 and 8.18 prior to 8.21.0 patch 5115, 8.20.6 patch 5114 and 8.18.6 patch 5113 respectively."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-19T17:15Z",
    "lastModifiedDate" : "2025-03-19T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0432",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf?sfvrsn=37160847_4",
          "name" : "https://hmsnetworks.blob.core.windows.net/nlw/docs/default-source/products/ewon/manuals-and-guides---installation-guides/best-practices-for-a-secure-usage-of-the-ewon-solution-en.pdf?sfvrsn=37160847_4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface",
          "name" : "https://support.hms-networks.com/hc/en-us/articles/19393244940818-How-to-block-all-the-unused-Ewon-Flexy-Cosy131-services-on-the-LAN-WAN-and-or-VPN-interface",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-06",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-06",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.hms-networks.com/cyber-security",
          "name" : "https://www.hms-networks.com/cyber-security",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "EWON Flexy 202 transmits user credentials in clear text with no encryption when a user is added, or user credentials are changed via its webpage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T16:15Z",
    "lastModifiedDate" : "2025-01-28T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0433",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1117",
          "name" : "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-image-hover-effects/ma-image-hover-effects.php#L1117",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L568",
          "name" : "https://plugins.trac.wordpress.org/browser/master-addons/trunk/addons/ma-tabs/ma-tabs.php#L568",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3243199/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3243199/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/master-addons/#developers",
          "name" : "https://wordpress.org/plugins/master-addons/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c693831f-fe60-4548-83aa-4ebd03d134ec?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c693831f-fe60-4548-83aa-4ebd03d134ec?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Master Addons – Elementor Addons with White Label, Free Widgets, Hover Effects, Conditions, & Animations plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘id’ parameter in all versions up to, and including, 2.0.7.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:master-addons:master_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.0.7.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T09:15Z",
    "lastModifiedDate" : "2025-03-04T20:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0434",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/374627491",
          "name" : "https://issues.chromium.org/issues/374627491",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds memory access in V8 in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T17:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0435",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/379652406",
          "name" : "https://issues.chromium.org/issues/379652406",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Navigation in Google Chrome on Android prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "132.0.6834.83",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:google:android:12.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T17:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0436",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-472"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/382786791",
          "name" : "https://issues.chromium.org/issues/382786791",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Integer overflow in Skia in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0437",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/378623799",
          "name" : "https://issues.chromium.org/issues/378623799",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds read in Metrics in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-02-03T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0438",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/384186539",
          "name" : "https://issues.chromium.org/issues/384186539",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Stack buffer overflow in Tracing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0439",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/371247941",
          "name" : "https://issues.chromium.org/issues/371247941",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Race in Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0440",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/40067914",
          "name" : "https://issues.chromium.org/issues/40067914",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Fullscreen in Google Chrome on Windows prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "132.0.6834.83",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0441",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/368628042",
          "name" : "https://issues.chromium.org/issues/368628042",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Fenced Frames in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to obtain potentially sensitive information from the system via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0442",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/40940854",
          "name" : "https://issues.chromium.org/issues/40940854",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Payments in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0443",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/376625003",
          "name" : "https://issues.chromium.org/issues/376625003",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient data validation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform privilege escalation via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0444",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/390889644",
          "name" : "https://issues.chromium.org/issues/390889644",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Skia in Google Chrome prior to 133.0.6943.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.53",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T19:15Z",
    "lastModifiedDate" : "2025-04-08T12:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0445",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/392521083",
          "name" : "https://issues.chromium.org/issues/392521083",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in V8 in Google Chrome prior to 133.0.6943.53 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.53",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T19:15Z",
    "lastModifiedDate" : "2025-04-08T12:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0446",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/359949844",
          "name" : "https://issues.chromium.org/issues/359949844",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Extensions in Google Chrome prior to 132.0.6834.83 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0447",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/375550814",
          "name" : "https://issues.chromium.org/issues/375550814",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Navigation in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to perform privilege escalation via a crafted HTML page. (Chromium security severity: Low)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0448",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_14.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/377948403",
          "name" : "https://issues.chromium.org/issues/377948403",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Compositing in Google Chrome prior to 132.0.6834.83 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.83",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0450",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.muffingroup.com/changelog/",
          "name" : "https://support.muffingroup.com/changelog/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/340c14ea-70b9-4f60-84b3-97328432f110?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/340c14ea-70b9-4f60-84b3-97328432f110?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Betheme plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's custom JS functionality in all versions up to, and including, 27.6.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:muffingroup:betheme:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "27.6.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-21T11:15Z",
    "lastModifiedDate" : "2025-06-05T14:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0451",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/40061026",
          "name" : "https://issues.chromium.org/issues/40061026",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Extensions API in Google Chrome prior to 133.0.6943.53 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.53",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T19:15Z",
    "lastModifiedDate" : "2025-04-08T12:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0452",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/7e854343-3d61-47d4-ad41-c4d2f356a54a",
          "name" : "https://huntr.com/bounties/7e854343-3d61-47d4-ad41-c4d2f356a54a",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "eosphoros-ai/DB-GPT version latest is vulnerable to arbitrary file deletion on Windows systems via the '/v1/agent/hub/update' endpoint. The application fails to properly filter the '\\' character, which is commonly used as a separator in Windows paths. This vulnerability allows attackers to delete any files on the host system by manipulating the 'plugin_repo_name' variable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dbgpt:db-gpt:0.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-07-17T15:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0453",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/788327ec-714a-4d5c-83aa-8df04dd7612b",
          "name" : "https://huntr.com/bounties/788327ec-714a-4d5c-83aa-8df04dd7612b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://huntr.com/bounties/788327ec-714a-4d5c-83aa-8df04dd7612b",
          "name" : "https://huntr.com/bounties/788327ec-714a-4d5c-83aa-8df04dd7612b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In mlflow/mlflow version 2.17.2, the `/graphql` endpoint is vulnerable to a denial of service attack. An attacker can create large batches of queries that repeatedly request all runs from a given experiment. This can tie up all the workers allocated by MLFlow, rendering the application unable to respond to other requests. This vulnerability is due to uncontrolled resource consumption."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lfprojects:mlflow:2.17.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-04-02T16:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0454",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/significant-gravitas/autogpt/commit/ff065cd24c2289878c0abdb9adbf91c305f0d70a",
          "name" : "https://github.com/significant-gravitas/autogpt/commit/ff065cd24c2289878c0abdb9adbf91c305f0d70a",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/0664fdee-bdc2-4650-8075-74d7b8d3e308",
          "name" : "https://huntr.com/bounties/0664fdee-bdc2-4650-8075-74d7b8d3e308",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Server-Side Request Forgery (SSRF) vulnerability was identified in the Requests utility of significant-gravitas/autogpt versions prior to v0.4.0. The vulnerability arises due to a hostname confusion between the `urlparse` function from the `urllib.parse` library and the `requests` library. A malicious user can exploit this by submitting a specially crafted URL, such as `http://localhost:\\@google.com/../`, to bypass the SSRF check and perform an SSRF attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:agpt:autogpt_platform:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-08-05T17:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0455",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8358-143bc-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8358-143bc-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8357-28308-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8357-28308-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The airPASS from NetVision Information has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-16T02:15Z",
    "lastModifiedDate" : "2025-01-16T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0456",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8360-e97b8-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8360-e97b8-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8359-53aa7-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8359-53aa7-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The airPASS from NetVision Information has a Missing Authentication vulnerability, allowing unauthenticated remote attackers to access the specific administrative functionality to retrieve * all accounts and passwords."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-16T02:15Z",
    "lastModifiedDate" : "2025-01-16T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0457",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8362-efb33-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8362-efb33-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8361-ff3fb-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8361-ff3fb-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The airPASS from NetVision Information has an OS Command Injection vulnerability, allowing remote attackers with regular privileges to inject and execute arbitrary OS commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-16T02:15Z",
    "lastModifiedDate" : "2025-01-16T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0458",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.291475",
          "name" : "VDB-291475 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291475",
          "name" : "VDB-291475 | Virtual Computer Vysual RH Solution Login Panel index.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.473865",
          "name" : "Submit #473865 | Virtual Computer SA Vysual RH Solution 2024.12.1 Reflected Cross-Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Virtual Computer Vysual RH Solution 2024.12.1. Affected by this vulnerability is an unknown functionality of the file /index.php of the component Login Panel. The manipulation of the argument page leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T16:15Z",
    "lastModifiedDate" : "2025-01-14T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0459",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.291476",
          "name" : "VDB-291476 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291476",
          "name" : "VDB-291476 | libretro RetroArch Startup profapi.dll untrusted search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474011",
          "name" : "Submit #474011 | retroarch 1.19.1 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in libretro RetroArch up to 1.19.1 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll of the component Startup. The manipulation leads to untrusted search path. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T16:15Z",
    "lastModifiedDate" : "2025-01-14T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0460",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/28124198128022a1c2b4060f74d99cd6",
          "name" : "https://gist.github.com/mcdruid/28124198128022a1c2b4060f74d99cd6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291477",
          "name" : "VDB-291477 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291477",
          "name" : "VDB-291477 | Blog Botz for Journal Theme blog_add unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474089",
          "name" : "Submit #474089 | BlogBotz OpenCart module 1.0 Unrestricted File Upload",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Blog Botz for Journal Theme 1.0 on OpenCart. This affects an unknown part of the file /index.php?route=extension/module/blog_add. The manipulation of the argument image leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T16:15Z",
    "lastModifiedDate" : "2025-01-14T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0461",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BxYQ/ld/blob/main/downloadSocialPromotionQrcode_fileread.doc",
          "name" : "https://github.com/BxYQ/ld/blob/main/downloadSocialPromotionQrcode_fileread.doc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291478",
          "name" : "VDB-291478 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291478",
          "name" : "VDB-291478 | Shanghai Lingdang Information Technology Lingdang CRM index.php path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474252",
          "name" : "Submit #474252 | Shanghai Lingdang Information Technology Co., Ltd. Lingdang CRM  <=V8.6.0.0 File and Directory Information Exposure",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as problematic. This vulnerability affects unknown code of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. The manipulation of the argument pathfile leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T16:15Z",
    "lastModifiedDate" : "2025-01-14T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0462",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BxYQ/ld/blob/main/ListView_SQL.doc",
          "name" : "https://github.com/BxYQ/ld/blob/main/ListView_SQL.doc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291479",
          "name" : "VDB-291479 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291479",
          "name" : "VDB-291479 | Shanghai Lingdang Information Technology Lingdang CRM index.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474254",
          "name" : "Submit #474254 | Shanghai Lingdang Information Technology Co., Ltd. Lingdang CRM  <=V8.6.0.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0 and classified as critical. This issue affects some unknown processing of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1. The manipulation of the argument searchcontent leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T17:15Z",
    "lastModifiedDate" : "2025-01-14T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0463",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BxYQ/ld/blob/main/File_Upload_vul.doc",
          "name" : "https://github.com/BxYQ/ld/blob/main/File_Upload_vul.doc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291480",
          "name" : "VDB-291480 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291480",
          "name" : "VDB-291480 | Shanghai Lingdang Information Technology Lingdang CRM index.php unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474255",
          "name" : "Submit #474255 | Shanghai Lingdang Information Technology Co., Ltd. Lingdang CRM  <=V8.6.0.0 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Shanghai Lingdang Information Technology Lingdang CRM up to 8.6.0.0. It has been classified as critical. Affected is an unknown function of the file /crm/weixinmp/index.php?userid=123&module=Users&usid=1&action=UsersAjax&minipro_const_type=1&related_module=Singin. The manipulation of the argument name leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T17:15Z",
    "lastModifiedDate" : "2025-01-14T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0464",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.291481",
          "name" : "VDB-291481 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291481",
          "name" : "VDB-291481 | SourceCodester Task Reminder System Maintenance Section cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474280",
          "name" : "Submit #474280 | oretnom23 Task Reminder System 0.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Task Reminder System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Maintenance Section. The manipulation of the argument System Name leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:oretnom23:task_reminder_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-14T17:15Z",
    "lastModifiedDate" : "2025-02-11T14:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0465",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/PSDat123/ad7eb46550f22632aa4c229a0857f00d",
          "name" : "https://gist.github.com/PSDat123/ad7eb46550f22632aa4c229a0857f00d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291482",
          "name" : "VDB-291482 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291482",
          "name" : "VDB-291482 | AquilaCMS categories deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474285",
          "name" : "Submit #474285 | AquilaCMS 1.412.13 Code Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in AquilaCMS 1.412.13. It has been rated as critical. Affected by this issue is some unknown functionality of the file /api/v2/categories. The manipulation of the argument PostBody.populate leads to deserialization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T18:15Z",
    "lastModifiedDate" : "2025-01-14T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0466",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/53ab86dc-1195-4ba0-8eda-6a0d7b45c45f/",
          "name" : "https://wpscan.com/vulnerability/53ab86dc-1195-4ba0-8eda-6a0d7b45c45f/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Sensei LMS  WordPress plugin before 4.24.4 does not properly protect some its REST API routes, allowing unauthenticated attackers to leak sensei_email and sensei_message Information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:automattic:sensei_lms:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.24.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T06:15Z",
    "lastModifiedDate" : "2025-05-13T18:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0467",
        "ASSIGNER" : "security@imgtec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "name" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Kernel software installed and running inside a Guest VM may exploit memory shared with the GPU Firmware to write data outside the Guest's virtualised GPU memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imaginationtech:ddk:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "24.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-18T01:15Z",
    "lastModifiedDate" : "2025-07-11T16:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0468",
        "ASSIGNER" : "security@imgtec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "name" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Software installed and run as a non-privileged user may conduct improper GPU system calls to subvert GPU HW to write to arbitrary physical memory pages.\n\nUnder certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform altering their behaviour."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-04T16:15Z",
    "lastModifiedDate" : "2025-04-07T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0469",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/forminator/tags/1.39.2/assets/forminator-ui/js/forminator-form.js#L888",
          "name" : "https://plugins.trac.wordpress.org/browser/forminator/tags/1.39.2/assets/forminator-ui/js/forminator-form.js#L888",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/14043276-ba0a-4862-a1a7-00b4c372c5bc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/14043276-ba0a-4862-a1a7-00b4c372c5bc?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the slider template data in all versions up to, and including, 1.39.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmudev:forminator_forms:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "1.39.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-27T05:15Z",
    "lastModifiedDate" : "2025-03-11T19:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0470",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/forminator/tags/1.38.2/requirejs/main.js",
          "name" : "https://plugins.trac.wordpress.org/browser/forminator/tags/1.38.2/requirejs/main.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3226716%40forminator%2Ftrunk&old=3222217%40forminator%2Ftrunk&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3226716%40forminator%2Ftrunk&old=3222217%40forminator%2Ftrunk&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5281d4b-c2cd-4972-b837-e101a8893c6e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5281d4b-c2cd-4972-b837-e101a8893c6e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Forminator Forms – Contact Form, Payment Form & Custom Form Builder plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the title parameter in all versions up to, and including, 1.38.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmudev:forminator_forms:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "1.38.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-31T04:15Z",
    "lastModifiedDate" : "2025-05-23T16:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0471",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted file upload vulnerability in the PMB platform, affecting versions 4.0.10 and above. This vulnerability could allow an attacker to upload a file to gain remote access to the machine, being able to access, modify and execute commands freely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-16T13:15Z",
    "lastModifiedDate" : "2025-05-07T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0472",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          }, {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Information exposure in the PMB platform affecting versions 4.2.13 and earlier. This vulnerability allows an attacker to upload a file to the environment and enumerate the internal files of a machine by looking at the request response."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "4.2.13",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-16T13:15Z",
    "lastModifiedDate" : "2025-05-07T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0473",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-459"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-pmb-platform",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability in the PMB platform that allows an attacker to persist temporary files on the server, affecting versions 4.0.10 and above. This vulnerability exists in the file upload functionality on the ‘/pmb/authorities/import/iimport_authorities’ endpoint. When a file is uploaded via this resource, the server will create a temporary file that will be deleted after the client sends a POST request to ‘/pmb/authorities/import/iimport_authorities’. This workflow is automated by the web client, however an attacker can trap and launch the second POST request to prevent the temporary file from being deleted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sigb:pmb:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-16T13:15Z",
    "lastModifiedDate" : "2025-05-07T16:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0474",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/invoiceninja/invoiceninja/commit/2a9bf353b432d7060e85487b617151ecbc36247d",
          "name" : "https://github.com/invoiceninja/invoiceninja/commit/2a9bf353b432d7060e85487b617151ecbc36247d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/invoiceninja/invoiceninja/compare/97ae948618230c1812f3223b80bf22dcb0382dc5..435780932fe19063001d79ba518815df62773d71",
          "name" : "https://github.com/invoiceninja/invoiceninja/compare/97ae948618230c1812f3223b80bf22dcb0382dc5..435780932fe19063001d79ba518815df62773d71",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vulncheck.com/advisories/invoice-ninja-ssrf",
          "name" : "https://vulncheck.com/advisories/invoice-ninja-ssrf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Invoice Ninja is vulnerable to authenticated Server-Side Request Forgery (SSRF) allowing for arbitrary file read and network resource requests as the application user.\nThis issue affects Invoice Ninja: from 5.8.56 through 5.11.23."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T19:15Z",
    "lastModifiedDate" : "2025-01-14T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0475",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/513142",
          "name" : "GitLab Issue #513142",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2932309",
          "name" : "HackerOne Bug Bounty Report #2932309",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 15.10 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1. A proxy feature could potentially allow unintended content rendering leading to XSS under specific circumstances."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "15.10.0",
          "versionEndExcluding" : "17.7.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "15.10.0",
          "versionEndExcluding" : "17.7.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-03T11:15Z",
    "lastModifiedDate" : "2025-03-07T12:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0476",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Mobile Apps versions <=2.22.0 fail to properly handle specially crafted attachment names, which allows an attacker to crash the mobile app for any user who opened a channel containing the specially crafted attachment"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-16T00:15Z",
    "lastModifiedDate" : "2025-01-16T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0477",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An encryption vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to a weak encryption methodology and could allow a threat actor to extract passwords belonging to other users of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T18:15Z",
    "lastModifiedDate" : "2025-01-30T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0478",
        "ASSIGNER" : "security@imgtec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "name" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Software installed and run as a non-privileged user may conduct improper GPU system calls to issue reads and writes to arbitrary physical memory pages.\n\nUnder certain circumstances this exploit could be used to corrupt data pages not allocated by the GPU driver but memory pages in use by the kernel and drivers running on the platform, altering their behaviour."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-24T12:15Z",
    "lastModifiedDate" : "2025-03-24T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0479",
        "ASSIGNER" : "vdisclose@cert-in.org.in"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1004"
          }, {
            "lang" : "en",
            "value" : "CWE-614"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0005",
          "name" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0005",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability exists in the CP Plus Router due to insecure handling of cookie flags used within its web interface. A remote attacker could exploit this vulnerability by intercepting data transmissions during an HTTP session on the vulnerable system.\n \nSuccessful exploitation of this vulnerability could allow the attacker to obtain sensitive information and compromise the targeted system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-20T12:15Z",
    "lastModifiedDate" : "2025-01-20T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0480",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wuzhicms/wuzhicms/issues/212",
          "name" : "https://github.com/wuzhicms/wuzhicms/issues/212",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/wuzhicms/wuzhicms/issues/212#issue-2769226216",
          "name" : "https://github.com/wuzhicms/wuzhicms/issues/212#issue-2769226216",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291915",
          "name" : "VDB-291915 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291915",
          "name" : "VDB-291915 | wuzhicms config.php test server-side request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.474965",
          "name" : "Submit #474965 | wuzhicms 4.1.0 SSRF",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in wuzhicms 4.1.0. This affects the function test of the file coreframe/app/search/admin/config.php. The manipulation of the argument sphinxhost/sphinxport leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wuzhicms:wuzhicms:4.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-15T18:15Z",
    "lastModifiedDate" : "2025-05-13T13:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0481",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-878/dllog.md",
          "name" : "https://github.com/abcdefg-png/IoT-vulnerable/blob/main/Unauthorized_Vulnerability/D-Link/DIR-878/dllog.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291924",
          "name" : "VDB-291924 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291924",
          "name" : "VDB-291924 | D-Link DIR-878 HTTP POST Request dllog.cgi information disclosure",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475011",
          "name" : "Submit #475011 | D-Link DIR-878 HW:A1 FW:1.03 Improper Access Controls",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in D-Link DIR-878 1.03. Affected is an unknown function of the file /dllog.cgi of the component HTTP POST Request Handler. The manipulation leads to information disclosure. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-878_firmware:1.03:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dir-878:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-15T19:15Z",
    "lastModifiedDate" : "2025-07-16T14:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0482",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/4",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/4",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/4#issue-2769866348",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291927",
          "name" : "VDB-291927 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291927",
          "name" : "VDB-291927 | Fanli2012 native-php-cms user_recoverpwd.php default credentials",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475237",
          "name" : "Submit #475237 | Fanli2012 native-php-cms 1.0 logic vulnerability",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file /fladmin/user_recoverpwd.php. The manipulation leads to use of default credentials. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-15T20:15Z",
    "lastModifiedDate" : "2025-04-29T20:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0483",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/5",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/5",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/5#issue-2769894596",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/5#issue-2769894596",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/5#issue-2769894596",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/5#issue-2769894596",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291928",
          "name" : "VDB-291928 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291928",
          "name" : "VDB-291928 | Fanli2012 native-php-cms jump.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475240",
          "name" : "Submit #475240 | Fanli2012 native-php-cms 1.0 reflection XSS",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Fanli2012 native-php-cms 1.0 and classified as problematic. This vulnerability affects unknown code of the file /fladmin/jump.php. The manipulation of the argument message/error leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-01-15T20:15Z",
    "lastModifiedDate" : "2025-05-13T13:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0484",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/6",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/6#issue-2769903928",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/6#issue-2769903928",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291929",
          "name" : "VDB-291929 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291929",
          "name" : "VDB-291929 | Fanli2012 native-php-cms Backend sysconfig_doedit.php improper authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475245",
          "name" : "Submit #475245 | Fanli2012 native-php-cms 1.0 unauthorized access",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Fanli2012 native-php-cms 1.0 and classified as critical. This issue affects some unknown processing of the file /fladmin/sysconfig_doedit.php of the component Backend. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-15T20:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0485",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/7",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/7#issue-2769919832",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/7#issue-2769919832",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291930",
          "name" : "VDB-291930 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291930",
          "name" : "VDB-291930 | Fanli2012 native-php-cms sysconfig_doedit.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475247",
          "name" : "Submit #475247 | Fanli2012 native-php-cms 1.0 Storage XSS",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been classified as problematic. Affected is an unknown function of the file /fladmin/sysconfig_doedit.php. The manipulation of the argument info leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-15T20:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0486",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/8",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/8#issue-2769942639",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/8#issue-2769942639",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291931",
          "name" : "VDB-291931 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291931",
          "name" : "VDB-291931 | Fanli2012 native-php-cms login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475249",
          "name" : "Submit #475249 | Fanli2012 native-php-cms 1.0 universal password",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /fladmin/login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T21:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0487",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/9",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/9",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/9#issue-2769962332",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291932",
          "name" : "VDB-291932 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291932",
          "name" : "VDB-291932 | Fanli2012 native-php-cms cat_edit.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475254",
          "name" : "Submit #475254 | Fanli2012 native-php-cms 1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Fanli2012 native-php-cms 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /fladmin/cat_edit.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T21:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0488",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/10",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/10",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/10",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/10",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/10#issue-2769983658",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291933",
          "name" : "VDB-291933 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291933",
          "name" : "VDB-291933 | Fanli2012 native-php-cms product_list.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475255",
          "name" : "Submit #475255 | Fanli2012 native-php-cms 1.0 SQL injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in Fanli2012 native-php-cms 1.0. This affects an unknown part of the file product_list.php. The manipulation of the argument cat leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T21:15Z",
    "lastModifiedDate" : "2025-05-05T15:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0489",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/11",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/11",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/11",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/11",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/11#issue-2769999157",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291934",
          "name" : "VDB-291934 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291934",
          "name" : "VDB-291934 | Fanli2012 native-php-cms friendlink_dodel.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475256",
          "name" : "Submit #475256 | Fanli2012 native-php-cms 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Fanli2012 native-php-cms 1.0. This vulnerability affects unknown code of the file /fladmin/friendlink_dodel.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T22:15Z",
    "lastModifiedDate" : "2025-05-05T15:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0490",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/12",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/12",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/12",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/12",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/12#issue-2770013163",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291935",
          "name" : "VDB-291935 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291935",
          "name" : "VDB-291935 | Fanli2012 native-php-cms article_dodel.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475258",
          "name" : "Submit #475258 | Fanli2012 native-php-cms 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Fanli2012 native-php-cms 1.0. This issue affects some unknown processing of the file /fladmin/article_dodel.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:native-php-cms_project:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T22:15Z",
    "lastModifiedDate" : "2025-05-05T15:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0491",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/13",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/13",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466",
          "name" : "https://github.com/Fanli2012/native-php-cms/issues/13#issue-2770022466",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291936",
          "name" : "VDB-291936 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.291936",
          "name" : "VDB-291936 | Fanli2012 native-php-cms cat_dodel.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.475260",
          "name" : "Submit #475260 | Fanli2012 native-php-cms 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Fanli2012 native-php-cms 1.0. Affected is an unknown function of the file /fladmin/cat_dodel.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fanli2012:native-php-cms:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-15T22:15Z",
    "lastModifiedDate" : "2025-02-27T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0492",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          }, {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-FUN_00412244-NULL-Pointer-Dereference-1730448e619580fcb7f9d871c6e7190a",
          "name" : "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-FUN_00412244-NULL-Pointer-Dereference-1730448e619580fcb7f9d871c6e7190a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.291937",
          "name" : "VDB-291937 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.291937",
          "name" : "VDB-291937 | D-Link DIR-823X FUN_00412244 null pointer dereference",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475301",
          "name" : "Submit #475301 | D-Link DIR-823X 240126, 240802 NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in D-Link DIR-823X 240126/240802 and classified as critical. Affected by this vulnerability is the function FUN_00412244. The manipulation leads to null pointer dereference. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T22:15Z",
    "lastModifiedDate" : "2025-01-15T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0493",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.14/classes/class-mvx-ajax.php#L661",
          "name" : "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.14/classes/class-mvx-ajax.php#L661",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.15/classes/class-mvx-ajax.php#L661",
          "name" : "https://plugins.trac.wordpress.org/browser/dc-woocommerce-multi-vendor/tags/4.2.15/classes/class-mvx-ajax.php#L661",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/812029d9-95d6-4bc9-98b2-700f462163b3?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/812029d9-95d6-4bc9-98b2-700f462163b3?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The MultiVendorX – The Ultimate WooCommerce Multivendor Marketplace Solution plugin for WordPress is vulnerable to Limited  Local File Inclusion in all versions up to, and including, 4.2.14 via the tabname parameter. This makes it possible for unauthenticated attackers to include PHP files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where PHP files can be uploaded and included"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:multivendorx:multivendorx:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.2.15",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-31T05:15Z",
    "lastModifiedDate" : "2025-05-23T16:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0495",
        "ASSIGNER" : "security@docker.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/docker/buildx",
          "name" : "https://github.com/docker/buildx",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Buildx is a Docker CLI plugin that extends build capabilities using BuildKit.\n\nCache backends support credentials by setting secrets directly as attribute values in cache-to/cache-from configuration. When supplied as user input, these secure values may be inadvertently captured in OpenTelemetry traces as part of the arguments and flags for the traced CLI command. OpenTelemetry traces are also saved in BuildKit daemon's history records.\n\n\nThis vulnerability does not impact secrets passed to the Github cache backend via environment variables or registry authentication."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T20:15Z",
    "lastModifiedDate" : "2025-03-17T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0497",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to storing credentials in the configuration file of EventLogAttachmentExtractor, ArchiveExtractor, LogCleanUp, or ArchiveLogCleanUp packages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T18:15Z",
    "lastModifiedDate" : "2025-01-30T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0498",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1721.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A data exposure vulnerability exists in all versions prior to V15.00.001 of Rockwell Automation FactoryTalk® AssetCentre. The vulnerability exists due to insecure storage of FactoryTalk® Security user tokens, which could allow a threat actor to steal a token and, impersonate another user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T18:15Z",
    "lastModifiedDate" : "2025-01-30T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0499",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T02:15Z",
    "lastModifiedDate" : "2025-02-11T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0500",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-001/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-001/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in the native clients for Amazon WorkSpaces (when running Amazon DCV protocol), Amazon AppStream 2.0, and Amazon DCV Clients may allow an attacker to access remote sessions via man-in-the-middle."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T19:15Z",
    "lastModifiedDate" : "2025-01-29T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0501",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-001/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-001/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue in the native clients for Amazon WorkSpaces (when running PCoIP protocol) may allow an attacker to access remote sessions via man-in-the-middle."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T19:15Z",
    "lastModifiedDate" : "2025-01-29T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0502",
        "ASSIGNER" : "security@craftersoftware.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://craftercms.com/docs/current/security/advisory.html#cv-2025011501",
          "name" : "https://craftercms.com/docs/current/security/advisory.html#cv-2025011501",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Transmission of Private Resources into a New Sphere ('Resource Leak') vulnerability in CrafterCMS Engine on Linux, MacOS, x86, Windows, 64 bit, ARM allows Directory Indexing, Resource Leak Exposure.This issue affects CrafterCMS: from 4.0.0 before 4.0.8, from 4.1.0 before 4.1.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T18:15Z",
    "lastModifiedDate" : "2025-01-15T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0503",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 9.11.x <= 9.11.6 fail to filter out DMs from the deleted channels endpoint which allows an attacker to infer user IDs and other metadata from deleted DMs if someone had manually marked DMs as deleted in the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T18:15Z",
    "lastModifiedDate" : "2025-02-14T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0505",
        "ASSIGNER" : "psirt@arista.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21315-security-advisory-0115",
          "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21315-security-advisory-0115",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On Arista CloudVision systems (virtual or physical on-premise deployments), Zero Touch Provisioning can be used to gain admin privileges on the CloudVision system, with more permissions than necessary, which can be used to query or manipulate system state for devices under management. Note that CloudVision as-a-Service is not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-08T19:16Z",
    "lastModifiedDate" : "2025-05-08T19:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0506",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/rise-blocks/tags/3.6/classes/blocks/site-identity.php#L375",
          "name" : "https://plugins.trac.wordpress.org/browser/rise-blocks/tags/3.6/classes/blocks/site-identity.php#L375",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec012e7-b997-466e-8676-8e9467473eae?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2ec012e7-b997-466e-8676-8e9467473eae?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Rise Blocks – A Complete Gutenberg Page Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the titleTag parameter in all versions up to, and including, 3.6 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eaglevisionit:rise_blocks:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "3.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T10:15Z",
    "lastModifiedDate" : "2025-02-25T19:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0507",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ploxel/tags/2.2.0/ploxel.php#L49",
          "name" : "https://plugins.trac.wordpress.org/browser/ploxel/tags/2.2.0/ploxel.php#L49",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3231203/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3231203/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/149edbdf-4a27-4d79-8dd1-b5b3efbf648b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/149edbdf-4a27-4d79-8dd1-b5b3efbf648b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ticketmeo – Sell Tickets – Event Ticketing plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's shortcodes in all versions up to, and including, 2.3.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-31T05:15Z",
    "lastModifiedDate" : "2025-01-31T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0508",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-440"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/aws/sagemaker-python-sdk/commit/dcdd99f911e8b1a05d19cf1ad939b0fefae47864",
          "name" : "https://github.com/aws/sagemaker-python-sdk/commit/dcdd99f911e8b1a05d19cf1ad939b0fefae47864",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://huntr.com/bounties/eb056818-5b81-466f-81ee-916058d34af2",
          "name" : "https://huntr.com/bounties/eb056818-5b81-466f-81ee-916058d34af2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the SageMaker Workflow component of aws/sagemaker-python-sdk allows for the possibility of MD5 hash collisions in all versions. This can lead to workflows being inadvertently replaced due to the reuse of results from different configurations that produce the same MD5 hash. This issue can cause integrity problems within the pipeline, potentially leading to erroneous processing outcomes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-20T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0509",
        "ASSIGNER" : "patrick@puiterwijk.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sparkle-project/Sparkle/pull/2550",
          "name" : "https://github.com/sparkle-project/Sparkle/pull/2550",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Patch" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250124-0008/",
          "name" : "https://security.netapp.com/advisory/ntap-20250124-0008/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://sparkle-project.org/documentation/security-and-reliability/",
          "name" : "https://sparkle-project.org/documentation/security-and-reliability/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue was found in Sparkle before version 2.6.4. An attacker can replace an existing signed update with another payload, bypassing Sparkle’s (Ed)DSA signing checks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sparkle-project:sparkle:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.6.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:oncommand_workflow_automation:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T20:15Z",
    "lastModifiedDate" : "2025-08-05T14:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0510",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940570",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940570",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Thunderbird displayed an incorrect sender address if the From field of an email used the invalid group name syntax that is described in CVE-2024-49040. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0511",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/usc-e-shop/trunk/functions/settlement_func.php#L612",
          "name" : "https://plugins.trac.wordpress.org/browser/usc-e-shop/trunk/functions/settlement_func.php#L612",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3235131/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3235131/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/usc-e-shop/#developers",
          "name" : "https://wordpress.org/plugins/usc-e-shop/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c26270b-a0a7-4877-aa66-bffe260003df?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c26270b-a0a7-4877-aa66-bffe260003df?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Welcart e-Commerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘name’ parameter in all versions up to, and including, 2.11.9 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:welcart:welcart_e-commerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.11.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T12:15Z",
    "lastModifiedDate" : "2025-02-20T20:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0512",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/structured-content/trunk/templates/shortcodes/local-business.php#L10",
          "name" : "https://plugins.trac.wordpress.org/browser/structured-content/trunk/templates/shortcodes/local-business.php#L10",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3248930/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3248930/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/structured-content/#developers",
          "name" : "https://wordpress.org/plugins/structured-content/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ac5fe69-7885-4fb7-8107-079216d6955e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8ac5fe69-7885-4fb7-8107-079216d6955e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Structured Content (JSON-LD) #wpsc plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's sc_fs_local_business shortcode in all versions up to, and including, 6.4.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpsc-plugin:structured_content:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.6.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T09:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0513",
        "ASSIGNER" : "security@octopus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.octopus.com/post/2024/sa2025-04/",
          "name" : "https://advisories.octopus.com/post/2024/sa2025-04/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In affected versions of Octopus Server error messages were handled unsafely on the error page. If an adversary could control any part of the error message they could embed code which may impact the user viewing the error message."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.3.164",
            "versionEndExcluding" : "2024.3.12985",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.4.401",
            "versionEndExcluding" : "2024.4.6962",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-11T11:15Z",
    "lastModifiedDate" : "2025-07-02T17:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0514",
        "ASSIGNER" : "security@documentfoundation.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.libreoffice.org/about-us/security/advisories/cve-2025-0514",
          "name" : "https://www.libreoffice.org/about-us/security/advisories/cve-2025-0514",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Input Validation vulnerability in The Document Foundation LibreOffice allows Windows Executable hyperlink  targets to be executed unconditionally on activation.This issue affects LibreOffice: from 24.8 before < 24.8.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-25T22:15Z",
    "lastModifiedDate" : "2025-02-25T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0515",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/buzz-club-night-club-dj-music-festival-event-wordpress-theme/17973992",
          "name" : "https://themeforest.net/item/buzz-club-night-club-dj-music-festival-event-wordpress-theme/17973992",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/44ad056b-8995-4068-8b05-4fefb8d2ff0a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/44ad056b-8995-4068-8b05-4fefb8d2ff0a?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Buzz Club – Night Club, DJ and Music Festival Event WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' function in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-18T07:15Z",
    "lastModifiedDate" : "2025-01-18T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0516",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/513540",
          "name" : "GitLab Issue #513540",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/2914644",
          "name" : "HackerOne Bug Bounty Report #2914644",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Authorization in GitLab CE/EE affecting all versions from 17.7 prior to 17.7.4, 17.8 prior to 17.8.2 allow users with limited permissions to perform unauthorized actions on critical project data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T16:15Z",
    "lastModifiedDate" : "2025-08-06T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0517",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-08T22:15Z",
    "lastModifiedDate" : "2025-02-08T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0518",
        "ASSIGNER" : "CyberarkLabs@Cyberark.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a",
          "name" : "https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unchecked Return Value, Out-of-bounds Read vulnerability in FFmpeg allows Read Sensitive Constants Within an Executable. This vulnerability is associated with program files  https://github.Com/FFmpeg/FFmpeg/blob/master/libavfilter/af_pan.C .\n\nThis issue affects FFmpeg: 7.1.\n\nIssue was fixed:  https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a\n\n https://github.com/FFmpeg/FFmpeg/commit/b5b6391d64807578ab872dc58fb8aa621dcfc38a This issue was discovered by: Simcha Kosman"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ffmpeg:ffmpeg:7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-16T17:15Z",
    "lastModifiedDate" : "2025-08-05T19:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0520",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/star7th/showdoc/pull/1059",
          "name" : "https://github.com/star7th/showdoc/pull/1059",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/vulhub/vulhub/tree/master/showdoc/CNVD-2020-26585",
          "name" : "https://github.com/vulhub/vulhub/tree/master/showdoc/CNVD-2020-26585",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cnvd.org.cn/flaw/show/CNVD-2020-26585",
          "name" : "https://www.cnvd.org.cn/flaw/show/CNVD-2020-26585",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unrestricted file upload vulnerability in ShowDoc caused by improper validation of file extension allows execution of arbitrary PHP, leading to remote code execution.This issue affects ShowDoc: before 2.8.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-29T20:15Z",
    "lastModifiedDate" : "2025-04-29T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0521",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3237626%40post-smtp%2Ftrunk&old=3229076%40post-smtp%2Ftrunk&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&new=3237626%40post-smtp%2Ftrunk&old=3229076%40post-smtp%2Ftrunk&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/366dfbf1-870c-4ce3-abc4-a2b2f4e72175?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/366dfbf1-870c-4ce3-abc4-a2b2f4e72175?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Post SMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the from and subject parameter in all versions up to, and including, 3.0.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpexperts:post_smtp:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-18T11:15Z",
    "lastModifiedDate" : "2025-02-21T12:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0522",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/4c2eed5a-f4d8-457d-a403-7eaced36c491/",
          "name" : "https://wpscan.com/vulnerability/4c2eed5a-f4d8-457d-a403-7eaced36c491/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The LikeBot  WordPress plugin through 0.85 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tommietott:likebot:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "0.85",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T06:15Z",
    "lastModifiedDate" : "2025-05-23T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0524",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-15T23:15Z",
    "lastModifiedDate" : "2025-03-15T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0525",
        "ASSIGNER" : "security@octopus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.octopus.com/post/2024/sa2025-02/",
          "name" : "https://advisories.octopus.com/post/2024/sa2025-02/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In affected versions of Octopus Server the preview import feature could be leveraged to identify the existence of a target file. This could provide an adversary with information that may aid in further attacks against the server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2020.6.4592",
            "versionEndExcluding" : "2024.3.13007",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.4.401",
            "versionEndExcluding" : "2024.4.6995",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-11T10:15Z",
    "lastModifiedDate" : "2025-07-02T17:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0526",
        "ASSIGNER" : "security@octopus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.octopus.com/post/2024/sa2025-03/",
          "name" : "https://advisories.octopus.com/post/2024/sa2025-03/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://advisories.octopus.com/post/2025/sa2025-03/",
          "name" : "https://advisories.octopus.com/post/2025/sa2025-03/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In affected versions of Octopus Deploy it was possible to upload files to unexpected locations on the host using an API endpoint. The field lacked validation which could potentially result in ways to circumvent expected workflows."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2022.4.791",
            "versionEndExcluding" : "2024.3.13097",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.4.401",
            "versionEndExcluding" : "2024.4.7091",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-02-11T11:15Z",
    "lastModifiedDate" : "2025-07-02T17:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0527",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Curious-L/-/issues/4",
          "name" : "https://github.com/Curious-L/-/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292411",
          "name" : "VDB-292411 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292411",
          "name" : "VDB-292411 | code-projects Admission Management System signupconfirm.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.477899",
          "name" : "Submit #477899 | code-projects.org Admission Management System V1.0 sql",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Admission Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /signupconfirm.php. The manipulation of the argument in_eml leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:admission_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T14:15Z",
    "lastModifiedDate" : "2025-03-03T15:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0528",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Pr0b1em/IoT/blob/master/TendaAC10v16.03.10.20telnet.md",
          "name" : "https://github.com/Pr0b1em/IoT/blob/master/TendaAC10v16.03.10.20telnet.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Pr0b1em/IoT/blob/master/TendaAC10v16.03.10.20telnet.md",
          "name" : "https://github.com/Pr0b1em/IoT/blob/master/TendaAC10v16.03.10.20telnet.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292412",
          "name" : "VDB-292412 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292412",
          "name" : "VDB-292412 | Tenda AC8/AC10/AC18 HTTP Request telnet command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.478175",
          "name" : "Submit #478175 | Tenda AC10v4.0 v16.03.10.20 Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Tenda AC8, AC10 and AC18 16.03.10.20. Affected by this issue is some unknown functionality of the file /goform/telnet of the component HTTP Request Handler. The manipulation leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac8_firmware:16.03.10.20:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac10_firmware:16.03.10.20:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac10:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac18_firmware:16.03.10.20:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac18:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T15:15Z",
    "lastModifiedDate" : "2025-05-28T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0529",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc",
          "name" : "https://gist.github.com/higordiego/f9943e2e6ba81a02a85dd07c742eecfc",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292413",
          "name" : "VDB-292413 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292413",
          "name" : "VDB-292413 | code-projects Train Ticket Reservation System Login Form stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.478447",
          "name" : "Submit #478447 | code-projects Train Ticket Reservation System 1.0 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in code-projects Train Ticket Reservation System 1.0. This affects an unknown part of the component Login Form. The manipulation of the argument username leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:train_ticket_reservation_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T15:15Z",
    "lastModifiedDate" : "2025-03-03T17:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0530",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/ha0day125/cve/blob/main/xss-ha0day.md",
          "name" : "https://github.com/ha0day125/cve/blob/main/xss-ha0day.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292414",
          "name" : "VDB-292414 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292414",
          "name" : "VDB-292414 | code-projects Job Recruitment _feedback_system.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.478674",
          "name" : "Submit #478674 | code-projects job-recruitment 1/0 php Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/_feedback_system.php. The manipulation of the argument type leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-01-17T16:15Z",
    "lastModifiedDate" : "2025-02-21T21:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0531",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/LamentXU123/cve/blob/main/sql_injection2.md",
          "name" : "https://github.com/LamentXU123/cve/blob/main/sql_injection2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292415",
          "name" : "VDB-292415 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292415",
          "name" : "VDB-292415 | code-projects Chat System leaveroom.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.478688",
          "name" : "Submit #478688 | code-projects Chat System Using PHP With Source Code 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/leaveroom.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-17T16:15Z",
    "lastModifiedDate" : "2025-03-03T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0532",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/TIANN0/CVE/issues/1",
          "name" : "https://github.com/TIANN0/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/TIANN0/CVE/issues/1",
          "name" : "https://github.com/TIANN0/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292416",
          "name" : "VDB-292416 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292416",
          "name" : "VDB-292416 | Codezips Gym Management System new_submit.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479100",
          "name" : "Submit #479100 | Codezips Gym Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/new_submit.php. The manipulation of the argument m_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T18:15Z",
    "lastModifiedDate" : "2025-04-22T19:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0533",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/onupset/CVE/issues/2",
          "name" : "https://github.com/onupset/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/onupset/CVE/issues/2",
          "name" : "https://github.com/onupset/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292417",
          "name" : "VDB-292417 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292417",
          "name" : "VDB-292417 | 1000 Projects Campaign Management System Platform for Women sc_login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479119",
          "name" : "Submit #479119 | 1000 Projects Campaign Management System Platform for Women 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /Code/sc_login.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:campaign_management_system_platform_for_women:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T18:15Z",
    "lastModifiedDate" : "2025-04-29T20:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0534",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/onupset/CVE/issues/3",
          "name" : "https://github.com/onupset/CVE/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/onupset/CVE/issues/3",
          "name" : "https://github.com/onupset/CVE/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292418",
          "name" : "VDB-292418 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Press/Media Coverage", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292418",
          "name" : "VDB-292418 | 1000 Projects Campaign Management System Platform for Women loginnew.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479128",
          "name" : "Submit #479128 | 1000 Projects Campaign Management System Platform for Women 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in 1000 Projects Campaign Management System Platform for Women 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /Code/loginnew.php. The manipulation of the argument Username leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:campaign_management_system_platform_for_women:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T19:15Z",
    "lastModifiedDate" : "2025-04-29T20:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0535",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/lan041221/cve/blob/main/SQL_Injection_in_Gym_Management_System.md",
          "name" : "https://github.com/lan041221/cve/blob/main/SQL_Injection_in_Gym_Management_System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/lan041221/cve/blob/main/SQL_Injection_in_Gym_Management_System.md",
          "name" : "https://github.com/lan041221/cve/blob/main/SQL_Injection_in_Gym_Management_System.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292419",
          "name" : "VDB-292419 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292419",
          "name" : "VDB-292419 | Codezips Gym Management System edit_mem_submit.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479159",
          "name" : "Submit #479159 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in Codezips Gym Management System 1.0. This affects an unknown part of the file /dashboard/admin/edit_mem_submit.php. The manipulation of the argument uid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T19:15Z",
    "lastModifiedDate" : "2025-04-22T19:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0536",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lan041221/cve/blob/main/Attendance_Tracking_Management_System_SQL_Injection.md",
          "name" : "https://github.com/lan041221/cve/blob/main/Attendance_Tracking_Management_System_SQL_Injection.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292420",
          "name" : "VDB-292420 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292420",
          "name" : "VDB-292420 | 1000 Projects Attendance Tracking Management System edit_action.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479251",
          "name" : "Submit #479251 | Attendance Tracking Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in 1000 Projects Attendance Tracking Management System 1.0. This vulnerability affects unknown code of the file /admin/edit_action.php. The manipulation of the argument attendance_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T20:15Z",
    "lastModifiedDate" : "2025-02-25T22:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0537",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/aaryan-11-x/My-CVEs/blob/main/CVE-2025-0537.md",
          "name" : "https://github.com/aaryan-11-x/My-CVEs/blob/main/CVE-2025-0537.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292421",
          "name" : "VDB-292421 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292421",
          "name" : "VDB-292421 | code-projects Car Rental Management System manage-pages.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479864",
          "name" : "Submit #479864 | code-projects Car Rental Management System 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Car Rental Management System 1.0. This issue affects some unknown processing of the file /admin/manage-pages.php. The manipulation of the argument pgdetails leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:online_car_rental_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-17T20:15Z",
    "lastModifiedDate" : "2025-02-21T21:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0538",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/aaryan-11-x/My-CVEs/blob/main/CVE-2025-0538.md",
          "name" : "https://github.com/aaryan-11-x/My-CVEs/blob/main/CVE-2025-0538.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292422",
          "name" : "VDB-292422 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292422",
          "name" : "VDB-292422 | code-projects Tourism Management System manage-pages.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.479895",
          "name" : "Submit #479895 | code-projects Tourism Management System 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in code-projects Tourism Management System 1.0. Affected is an unknown function of the file /admin/manage-pages.php. The manipulation of the argument pgedetails leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:tourism_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-17T21:15Z",
    "lastModifiedDate" : "2025-02-21T21:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0539",
        "ASSIGNER" : "security@octopus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.octopus.com/post/2025/sa2025-06",
          "name" : "https://advisories.octopus.com/post/2025/sa2025-06",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In affected Microsoft Windows versions of Octopus Deploy, the server can be coerced into sending server-side requests that contain authentication material allowing a suitably positioned attacker to compromise the account running Octopus Server and potentially the host infrastructure itself."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2.6.0",
            "versionEndExcluding" : "2024.3.13071",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.4.401",
            "versionEndExcluding" : "2024.4.7065",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-10T06:15Z",
    "lastModifiedDate" : "2025-07-02T17:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0540",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/1",
          "name" : "https://github.com/magic2353112890/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292432",
          "name" : "VDB-292432 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292432",
          "name" : "VDB-292432 | itsourcecode Tailoring Management System expadd.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.480063",
          "name" : "Submit #480063 | itsourcecode Tailoring Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /expadd.php. The manipulation of the argument expcat leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T21:15Z",
    "lastModifiedDate" : "2025-02-07T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0541",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nbeisss/CVE/issues/1",
          "name" : "https://github.com/nbeisss/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292433",
          "name" : "VDB-292433 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292433",
          "name" : "VDB-292433 | Codezips Gym Management System edit_member.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.480220",
          "name" : "Submit #480220 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/edit_member.php. The manipulation of the argument name leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-17T22:15Z",
    "lastModifiedDate" : "2025-02-25T22:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0542",
        "ASSIGNER" : "cve-request@cirosec.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nullby73/security-advisories/tree/main/CVE-2025-0542",
          "name" : "https://github.com/nullby73/security-advisories/tree/main/CVE-2025-0542",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Local privilege escalation due to incorrect assignment of privileges of temporary files in the update mechanism of G DATA Management Server. This vulnerability allows a local, unprivileged attacker to escalate privileges on affected installations by placing a crafted ZIP archive in a globally writable directory, which gets unpacked in the context of SYSTEM and results in arbitrary file write."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-25T17:15Z",
    "lastModifiedDate" : "2025-01-25T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0543",
        "ASSIGNER" : "cve-request@cirosec.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/nullby73/security-advisories/tree/main/CVE-2025-0543",
          "name" : "https://github.com/nullby73/security-advisories/tree/main/CVE-2025-0543",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Local privilege escalation in G DATA Security Client due to incorrect assignment of privileges to directories. This vulnerability allows a local, unprivileged attacker to escalate privileges on affected installations by placing an arbitrary executable in a globally writable directory resulting in execution by the SetupSVC.exe service in the context of SYSTEM."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-25T17:15Z",
    "lastModifiedDate" : "2025-01-25T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0545",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0041",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0041",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Tekrom Technology T-Soft E-Commerce allows Cross-Site Scripting (XSS).This issue affects T-Soft E-Commerce: before v5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-24T14:15Z",
    "lastModifiedDate" : "2025-02-24T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0549",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/513996",
          "name" : "GitLab Issue #513996",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/2927555",
          "name" : "HackerOne Bug Bounty Report #2927555",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions starting from 17.3 prior to 17.9.8, from 17.10 prior to 17.10.6, and from 17.11 prior to 17.11.2. A security vulnerability allows attackers to bypass Device OAuth flow protections, enabling authorization form submission through minimal user interaction."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.3.0",
          "versionEndExcluding" : "17.9.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.3.0",
          "versionEndExcluding" : "17.9.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-09T17:15Z",
    "lastModifiedDate" : "2025-08-08T16:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0554",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3217075%40podlove-podcasting-plugin-for-wordpress&new=3217075%40podlove-podcasting-plugin-for-wordpress&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3217075%40podlove-podcasting-plugin-for-wordpress&new=3217075%40podlove-podcasting-plugin-for-wordpress&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/39d41772-49f3-4bce-a170-cbe64ba99184?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/39d41772-49f3-4bce-a170-cbe64ba99184?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Podlove Podcast Publisher plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Feed Name value in version <= 4.1.25 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-18T06:15Z",
    "lastModifiedDate" : "2025-03-19T19:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0555",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514004",
          "name" : "GitLab Issue #514004",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2939833",
          "name" : "HackerOne Bug Bounty Report #2939833",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Cross Site Scripting (XSS) vulnerability in GitLab-EE affecting all versions from 16.6 prior to 17.7.6, 17.8 prior to 17.8.4, and 17.9 prior to 17.9.1 allows an attacker to bypass security controls and execute arbitrary scripts in a users browser under specific conditions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.6.0",
          "versionEndExcluding" : "17.7.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.9.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-03T16:15Z",
    "lastModifiedDate" : "2025-03-07T21:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0556",
        "ASSIGNER" : "security@progress.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.telerik.com/report-server/knowledge-base/kb-security-cleartext-transmission-cve-2025-0556",
          "name" : "https://docs.telerik.com/report-server/knowledge-base/kb-security-cleartext-transmission-cve-2025-0556",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Progress® Telerik® Report Server, versions prior to 2025 Q1 (11.0.25.211) when using the older .NET Framework implementation, communication of non-sensitive information between the service agent process and app host process occurs over an unencrypted tunnel, which can be subjected to local network traffic sniffing."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:progress:telerik_report_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.25.211",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T16:15Z",
    "lastModifiedDate" : "2025-02-20T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0557",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.292491",
          "name" : "VDB-292491 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292491",
          "name" : "VDB-292491 | Hyland Alfresco Community Edition URL s cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474306",
          "name" : "Submit #474306 | Alfresco Software Alfresco Community/Enterprise 5.2.0 to 6.2.2 Cross-Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Hyland Alfresco Community Edition and Alfresco Enterprise Edition up to 6.2.2. This affects an unknown part of the file /share/s/ of the component URL Handler. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-18T09:15Z",
    "lastModifiedDate" : "2025-01-18T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0558",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ggg48966/123123/blob/main/TDuckCloud.md",
          "name" : "https://github.com/ggg48966/123123/blob/main/TDuckCloud.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292492",
          "name" : "VDB-292492 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292492",
          "name" : "VDB-292492 | TDuckCloud tduck-platform QueryProThemeRequest.java QueryProThemeRequest sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.474613",
          "name" : "Submit #474613 | TDuckCloud tduck-platform 4.0 SQLi",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in TDuckCloud tduck-platform up to 4.0. This vulnerability affects the function QueryProThemeRequest of the file src/main/java/com/tduck/cloud/form/request/QueryProThemeRequest.java. The manipulation of the argument color leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-18T13:15Z",
    "lastModifiedDate" : "2025-01-18T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0559",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/CampCodes%20-%20School%20Management%20Software%20-%20Cross%20Site%20Scripting.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/CampCodes%20-%20School%20Management%20Software%20-%20Cross%20Site%20Scripting.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292493",
          "name" : "VDB-292493 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292493",
          "name" : "VDB-292493 | Campcodes School Management Software Create Id Card Page create-id-card cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.480306",
          "name" : "Submit #480306 | CampCodes School Management Software 1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Campcodes School Management Software 1.0. This issue affects some unknown processing of the file /create-id-card of the component Create Id Card Page. The manipulation of the argument ID Card Title leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-18T14:15Z",
    "lastModifiedDate" : "2025-02-28T02:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0560",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/CampCodes%20-%20School%20Management%20Software%20-%20Stored%20Cross%20Site%20Scripting.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/CampCodes%20-%20School%20Management%20Software%20-%20Stored%20Cross%20Site%20Scripting.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292494",
          "name" : "VDB-292494 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292494",
          "name" : "VDB-292494 | CampCodes School Management Software Photo Gallery Page photo-gallery cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.480688",
          "name" : "Submit #480688 | CampCodes School Management Software 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /photo-gallery of the component Photo Gallery Page. The manipulation of the argument Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-18T15:15Z",
    "lastModifiedDate" : "2025-02-28T02:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0561",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yunhai666/cve/issues/1",
          "name" : "https://github.com/yunhai666/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292522",
          "name" : "VDB-292522 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292522",
          "name" : "VDB-292522 | itsourcecode Farm Management System add-pig.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483396",
          "name" : "Submit #483396 | itsourcecode Farm Management System 1,0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Farm Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigno leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:farm_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-19T00:15Z",
    "lastModifiedDate" : "2025-02-07T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0562",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/LiuSir5211314/-sir/issues/1",
          "name" : "https://github.com/LiuSir5211314/-sir/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292523",
          "name" : "VDB-292523 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292523",
          "name" : "VDB-292523 | Codezips Gym Management System health_status_entry.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484184",
          "name" : "Submit #484184 | Security Advisory CodeZips Gym Management System V1.0 sql",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/health_status_entry.php. The manipulation of the argument usrid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-19T02:15Z",
    "lastModifiedDate" : "2025-02-28T02:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0563",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/LiuSir5211314/-sir/issues/2",
          "name" : "https://github.com/LiuSir5211314/-sir/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292524",
          "name" : "VDB-292524 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292524",
          "name" : "VDB-292524 | code-projects Fantasy-Cricket update.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484185",
          "name" : "Submit #484185 | code-projects.org Fantasy-Cricket V1.0 sql",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been classified as critical. Affected is an unknown function of the file /dash/update.php. The manipulation of the argument uname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-19T02:15Z",
    "lastModifiedDate" : "2025-02-28T02:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0564",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/LiuSir5211314/-sir/issues/3",
          "name" : "https://github.com/LiuSir5211314/-sir/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292525",
          "name" : "VDB-292525 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292525",
          "name" : "VDB-292525 | code-projects Fantasy-Cricket authenticate.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484186",
          "name" : "Submit #484186 | code-projects.org Fantasy-Cricket V1.0 sql",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Fantasy-Cricket 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /authenticate.php. The manipulation of the argument uname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:fantasy-cricket:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-19T04:15Z",
    "lastModifiedDate" : "2025-02-28T02:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0565",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/En0t5/vul/blob/main/zzcms/zzcsm-sql-inject.md",
          "name" : "https://github.com/En0t5/vul/blob/main/zzcms/zzcsm-sql-inject.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292526",
          "name" : "VDB-292526 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292526",
          "name" : "VDB-292526 | ZZCMS index.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484333",
          "name" : "Submit #484333 | ZZCMS 2023 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ZZCMS 2023. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zzcms:zzcms:2023:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-19T06:15Z",
    "lastModifiedDate" : "2025-04-22T19:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0566",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://pan.baidu.com/s/1DBDf27oCTIMkW-PSZwg02Q?pwd=tara",
          "name" : "https://pan.baidu.com/s/1DBDf27oCTIMkW-PSZwg02Q?pwd=tara",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292527",
          "name" : "VDB-292527 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292527",
          "name" : "VDB-292527 | Tenda AC15 SetDevNetName formSetDevNetName stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484418",
          "name" : "Submit #484418 | Tenda Tenda A15 V15.13.07.13 V15.13.07.13 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in Tenda AC15 15.13.07.13. This affects the function formSetDevNetName of the file /goform/SetDevNetName. The manipulation of the argument mac leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac15_firmware:15.13.07.13:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac15:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-19T07:15Z",
    "lastModifiedDate" : "2025-07-01T15:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0567",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.292528",
          "name" : "VDB-292528 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292528",
          "name" : "VDB-292528 | Epic Games Launcher Installer profapi.dll untrusted search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.481104",
          "name" : "Submit #481104 | Epic Games Epic Games Launcher 17.2.1 OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Epic Games Launcher up to 17.2.1. This vulnerability affects unknown code in the library profapi.dll of the component Installer. The manipulation leads to untrusted search path. Attacking locally is a requirement. The complexity of an attack is rather high. The exploitation appears to be difficult."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-19T08:15Z",
    "lastModifiedDate" : "2025-01-19T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0568",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-049/",
          "name" : "ZDI-25-049",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25302."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0569",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-052/",
          "name" : "ZDI-25-052",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25303."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0570",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-050/",
          "name" : "ZDI-25-050",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25304."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0571",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-051/",
          "name" : "ZDI-25-051",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server Web Portal DCM File Parsing Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25305."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0572",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-054/",
          "name" : "ZDI-25-054",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server Web Portal DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25308."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0573",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-053/",
          "name" : "ZDI-25-053",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server DCM File Parsing Directory Traversal Arbitrary File Write Vulnerability. This vulnerability allows remote attackers to create arbitrary files on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of DCM files. The issue results from the lack of proper validation of a user-supplied path prior to using it in file operations. An attacker can leverage this vulnerability to write files in the context of the current user. Was ZDI-CAN-25309."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0574",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-055/",
          "name" : "ZDI-25-055",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sante PACS Server URL path Memory Corruption Denial-of-Service Vulnerability. This vulnerability allows remote attackers to create a denial-of-service condition on affected installations of Sante PACS Server. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the parsing of URLs in the web server module. The issue results from the lack of proper validation of user-supplied data, which can result in a memory corruption condition. An attacker can leverage this vulnerability to create a denial-of-service condition on the system. Was ZDI-CAN-25318."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:santesoft:sante_pacs_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-19T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0575",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-693"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1kIXsZoD1FFps0bXQ1pbrfoo76Wy1pL7s/view?usp=drivesdk",
          "name" : "https://drive.google.com/file/d/1kIXsZoD1FFps0bXQ1pbrfoo76Wy1pL7s/view?usp=drivesdk",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292540",
          "name" : "VDB-292540 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292540",
          "name" : "VDB-292540 | Union Bank of India Vyom Rooting Detection protection mechanism",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475733",
          "name" : "Submit #475733 | union bank of india Vyom 8.0.34 Missing Immutable Root of Trust in Hardware",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Union Bank of India Vyom 8.0.34 on Android and classified as problematic. This vulnerability affects unknown code of the component Rooting Detection. The manipulation leads to protection mechanism failure. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.9,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-19T23:15Z",
    "lastModifiedDate" : "2025-01-19T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0576",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.292541",
          "name" : "VDB-292541 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292541",
          "name" : "VDB-292541 | Mobotix M15 player cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.475602",
          "name" : "Submit #475602 | Mobotix M15 MX-V4.3.4.83 Reflected Cross-Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Mobotix M15 4.3.4.83 and classified as problematic. This issue affects some unknown processing of the file /control/player?center&eventlist&pda&dummy_for_reload=1736177631&p_evt. The manipulation of the argument p_qual leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-20T00:15Z",
    "lastModifiedDate" : "2025-01-20T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0578",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.292596",
          "name" : "VDB-292596 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292596",
          "name" : "VDB-292596 | Facile Sistemas Cloud Apps Password Reset forgotpassword cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.476305",
          "name" : "Submit #476305 | Facile Cloud Apps Facile Sistemas N/A Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Facile Sistemas Cloud Apps up to 20250107. It has been classified as problematic. Affected is an unknown function of the file /account/forgotpassword of the component Password Reset Handler. The manipulation of the argument reterros leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-20T02:15Z",
    "lastModifiedDate" : "2025-01-20T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0579",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/3c9fc9bd4e882cee21f8a37998f56fce",
          "name" : "https://gist.github.com/mcdruid/3c9fc9bd4e882cee21f8a37998f56fce",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292597",
          "name" : "VDB-292597 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292597",
          "name" : "VDB-292597 | Shiprocket Module REST API Module restapi sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.476831",
          "name" : "Submit #476831 | ShipRocket OpenCart module v3 and v4 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Shiprocket Module 3/4 on OpenCart. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /index.php?route=extension/shiprocket/module/restapi of the component REST API Module. The manipulation of the argument x-username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-01-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0580",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          }, {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/0d1fdbba445587639ee5da66e7abfcc9",
          "name" : "https://gist.github.com/mcdruid/0d1fdbba445587639ee5da66e7abfcc9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292598",
          "name" : "VDB-292598 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.292598",
          "name" : "VDB-292598 | Shiprocket Module REST API Module rest_api authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.476832",
          "name" : "Submit #476832 | ShipRocket OpenCart module v3 Incorrect Authorization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Shiprocket Module 3 on OpenCart. It has been rated as critical. Affected by this issue is some unknown functionality of the file /index.php?route=extension/module/rest_api&action=getOrders of the component REST API Module. The manipulation of the argument contentHash leads to incorrect authorization. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-01-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0581",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/CampCodes%20-%20Stored%20Cross%20Site%20Scripting-%20Account%20Takeover%20Possibility.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/CampCodes%20-%20Stored%20Cross%20Site%20Scripting-%20Account%20Takeover%20Possibility.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292599",
          "name" : "VDB-292599 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292599",
          "name" : "VDB-292599 | CampCodes School Management Software Chat History send cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484895",
          "name" : "Submit #484895 | CampCodes School Management Software 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. This affects an unknown part of the file /chat/group/send of the component Chat History. The manipulation of the argument message leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-02-20T21:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0582",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yunhai666/cve/issues/2",
          "name" : "https://github.com/yunhai666/cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292600",
          "name" : "VDB-292600 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292600",
          "name" : "VDB-292600 | itsourcecode Farm Management System add-pig.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484909",
          "name" : "Submit #484909 | itsourcecode Farm Management System 1.0 Code Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in itsourcecode Farm Management System up to 1.0. This vulnerability affects unknown code of the file /add-pig.php. The manipulation of the argument pigphoto leads to unrestricted upload. The attack can be initiated remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-02-07T15:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0583",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8369-cf396-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8369-cf396-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8368-1e317-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8368-1e317-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The a+HRD from aEnrich Technology has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript codes in user's browser through phishing attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-20T02:15Z",
    "lastModifiedDate" : "2025-01-20T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0584",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8371-1c17a-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8371-1c17a-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8370-58eb5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8370-58eb5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The a+HRD from aEnrich Technology has a Server-side Request Forgery, allowing unauthenticated remote attackers to exploit this vulnerability to probe internal network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-01-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0585",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8373-91edc-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8373-91edc-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8372-19721-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8372-19721-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The a+HRD from aEnrich Technology has a SQL Injection vulnerability, allowing unauthenticated remote attackers to inject arbitrary SQL commands to read, modify, and delete database contents."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-01-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0586",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8375-59abd-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8375-59abd-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8374-7085a-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8374-7085a-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The a+HRD from aEnrich Technology has an Insecure Deserialization vulnerability, allowing remote attackers with database modification privileges and regular system privileges to perform arbitrary code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-20T03:15Z",
    "lastModifiedDate" : "2025-01-20T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0587",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.1",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-11T18:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0588",
        "ASSIGNER" : "security@octopus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.octopus.com/post/2024/sa2025-05/",
          "name" : "https://advisories.octopus.com/post/2024/sa2025-05/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://advisories.octopus.com/post/2024/sa2025-05/",
          "name" : "https://advisories.octopus.com/post/2024/sa2025-05/",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://advisories.octopus.com/post/2025/sa2025-05/",
          "name" : "https://advisories.octopus.com/post/2025/sa2025-05/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In affected versions of Octopus Server it was possible for a user with sufficient access to set custom headers in all server responses. By submitting a specifically crafted referrer header the user could ensure that all subsequent server responses would return 500 errors rendering the site mostly unusable. The user would be able to subsequently set and unset the referrer header to control the denial of service state with a valid CSRF token whilst new CSRF tokens could not be generated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2020.1.0",
            "versionEndExcluding" : "2024.3.13097",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.4.401",
            "versionEndExcluding" : "2024.4.7091",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-11T12:15Z",
    "lastModifiedDate" : "2025-07-02T17:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0589",
        "ASSIGNER" : "security@octopus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisories.octopus.com/post/2025/sa2025-01/",
          "name" : "https://advisories.octopus.com/post/2025/sa2025-01/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In affected versions of Octopus Deploy where customers are using Active Directory for authentication it was possible for an unauthenticated user to make an API request against two endpoints which would retrieve some data from the associated Active Directory. The requests when crafted correctly would return specific information from user profiles (Email address/UPN and Display name) from one endpoint and group information ( Group ID and Display name) from the other. This vulnerability does not expose data within the Octopus Server product itself."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2020.3.3",
            "versionEndExcluding" : "2024.3.13071",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:octopus:octopus_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "2024.4.401",
            "versionEndExcluding" : "2024.4.7065",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-11T09:15Z",
    "lastModifiedDate" : "2025-07-02T17:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0590",
        "ASSIGNER" : "security.tecno@tecno-mobile.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.tecno.com/SRC/blogdetail/381?lang=en_US",
          "name" : "https://security.tecno.com/SRC/blogdetail/381?lang=en_US",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.tecno.com/SRC/securityUpdates",
          "name" : "https://security.tecno.com/SRC/securityUpdates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper permission settings for mobile applications (com.transsion.carlcare) may lead to \n\ninformation leakage risk."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-20T07:17Z",
    "lastModifiedDate" : "2025-03-24T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0591",
        "ASSIGNER" : "omron@example.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2025-003_en.pdf",
          "name" : "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2025-003_en.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fa.omron.co.jp/product/security/assets/pdf/ja/OMSR-2025-003_ja.pdf",
          "name" : "https://www.fa.omron.co.jp/product/security/assets/pdf/ja/OMSR-2025-003_ja.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds Read vulnerability (CWE-125) was found in CX-Programmer. Attackers may be able to read sensitive information or cause an application crash by abusing this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T00:15Z",
    "lastModifiedDate" : "2025-02-17T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0592",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
          "name" : "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by manipulating the firmware file and uploading it to the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T21:15Z",
    "lastModifiedDate" : "2025-02-14T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0593",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
          "name" : "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0002.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The vulnerability may allow a remote low priviledged attacker to run arbitrary shell commands by using lower-level functions to interact with the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T21:15Z",
    "lastModifiedDate" : "2025-02-14T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0595",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting 3DDashboard in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0596",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Bookmark Editor in ENOVIA Collaborative Industry Innovator on Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0598",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Relations in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0599",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Document Management in ENOVIA Collaborative Industry Innovator on Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0600",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Product Explorer in ENOVIA Collaborative Industry Innovator on Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0601",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Issue Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0602",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Compare in Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2025x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-30T15:15Z",
    "lastModifiedDate" : "2025-05-30T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0604",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2544",
          "name" : "RHSA-2025:2544",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2545",
          "name" : "RHSA-2025:2545",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0604",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0604",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2338993",
          "name" : "RHBZ#2338993",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Keycloak. When an Active Directory user resets their password, the system updates it without performing an LDAP bind to validate the new credentials against AD. This vulnerability allows users whose AD accounts are expired or disabled to regain access in Keycloak, bypassing AD restrictions. The issue enables authentication bypass and could allow unauthorized access under certain conditions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T15:15Z",
    "lastModifiedDate" : "2025-03-10T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0605",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          }, {
            "lang" : "en",
            "value" : "CWE-1390"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514204",
          "name" : "GitLab Issue #514204",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2919391",
          "name" : "HackerOne Bug Bounty Report #2919391",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 16.8 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Group access controls could allow certain users to bypass two-factor authentication requirements."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.8.0",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.8.0",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-22T15:16Z",
    "lastModifiedDate" : "2025-05-29T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0611",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/386143468",
          "name" : "https://issues.chromium.org/issues/386143468",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Object corruption in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.110",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T20:15Z",
    "lastModifiedDate" : "2025-04-18T02:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0612",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_22.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://issues.chromium.org/issues/385155406",
          "name" : "https://issues.chromium.org/issues/385155406",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds memory access in V8 in Google Chrome prior to 132.0.6834.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.110",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T20:15Z",
    "lastModifiedDate" : "2025-04-18T02:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0613",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/22be2b44-cd42-4b02-8448-59dd2989dde1/",
          "name" : "https://wpscan.com/vulnerability/22be2b44-cd42-4b02-8448-59dd2989dde1/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Photo Gallery by 10Web  WordPress plugin before 1.8.34 does not sanitised and escaped comment added on images by unauthenticated users, leading to an Unauthenticated Stored-XSS attack when comments are displayed"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:10web:photo_gallery:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.34",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-31T06:15Z",
    "lastModifiedDate" : "2025-05-13T13:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0614",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-qualifios-wheel-fortune",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-qualifios-wheel-fortune",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Input validation vulnerability in Qualifio's Wheel of Fortune. This vulnerability could allow an attacker to modify a single email to contain upper and lower case characters in order to access the application and win prizes as many times as wanted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-21T12:15Z",
    "lastModifiedDate" : "2025-01-21T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0615",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-qualifios-wheel-fortune",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-qualifios-wheel-fortune",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Input validation vulnerability in Qualifio's Wheel of Fortune. This vulnerability allows an attacker to modify an email to contain the ‘+’ symbol to access the application and win prizes as many times as wanted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-21T12:15Z",
    "lastModifiedDate" : "2025-01-21T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0617",
        "ASSIGNER" : "trellixpsirt@trellix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-776"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://thrive.trellix.com/s/article/000014214",
          "name" : "https://thrive.trellix.com/s/article/000014214",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker with access to an HX 10.0.0  and previous versions, may send specially-crafted data to the HX console.  The malicious detection would then trigger file parsing containing exponential entity expansions in the consumer process thus causing a Denial of Service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-29T11:15Z",
    "lastModifiedDate" : "2025-01-29T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0618",
        "ASSIGNER" : "trellixpsirt@trellix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://thrive.trellix.com/s/article/000014456",
          "name" : "https://thrive.trellix.com/s/article/000014456",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A malicious third party could invoke a persistent denial of service vulnerability in FireEye EDR agent by sending a specially-crafted tamper protection event to the HX service to trigger an exception. This exception will prevent any further tamper protection events from being processed, even after a reboot of HX."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T07:15Z",
    "lastModifiedDate" : "2025-04-23T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0619",
        "ASSIGNER" : "security@m-files.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://product.m-files.com/security-advisories/cve-2025-0619/",
          "name" : "https://product.m-files.com/security-advisories/cve-2025-0619/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unsafe password recovery from configuration in M-Files Server before 25.1 allows a highly privileged user to recover external connector passwords"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-23T11:15Z",
    "lastModifiedDate" : "2025-01-23T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0620",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-552"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/06/03/8",
          "name" : "http://www.openwall.com/lists/oss-security/2025/06/03/8",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0620",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0620",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2370453",
          "name" : "RHBZ#2370453",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://www.samba.org/samba/security/CVE-2025-0620.html",
          "name" : "https://www.samba.org/samba/security/CVE-2025-0620.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Samba. The smbd service daemon does not pick up group membership changes when re-authenticating an expired SMB session. This issue can expose file shares until clients disconnect and then connect again."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samba:samba:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.21.0",
          "versionEndExcluding" : "4.21.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-06T14:15Z",
    "lastModifiedDate" : "2025-08-13T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0622",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:6990",
          "name" : "RHSA-2025:6990",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0622",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0622",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2345865",
          "name" : "RHBZ#2345865",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in command/gpg. In some scenarios, hooks created by loaded modules are not removed when the related module is unloaded. This flaw allows an attacker to force grub2 to call the hooks once the module that registered it was unloaded, leading to a use-after-free vulnerability. If correctly exploited, this vulnerability may result in arbitrary code execution, eventually allowing the attacker to bypass secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T20:15Z",
    "lastModifiedDate" : "2025-05-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0623",
        "ASSIGNER" : "security@watchguard.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-21T17:15Z",
    "lastModifiedDate" : "2025-01-21T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0624",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2521",
          "name" : "RHSA-2025:2521",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2653",
          "name" : "RHSA-2025:2653",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2655",
          "name" : "RHSA-2025:2655",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2675",
          "name" : "RHSA-2025:2675",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2784",
          "name" : "RHSA-2025:2784",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2799",
          "name" : "RHSA-2025:2799",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2867",
          "name" : "RHSA-2025:2867",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2869",
          "name" : "RHSA-2025:2869",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3297",
          "name" : "RHSA-2025:3297",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3301",
          "name" : "RHSA-2025:3301",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3367",
          "name" : "RHSA-2025:3367",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3396",
          "name" : "RHSA-2025:3396",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3573",
          "name" : "RHSA-2025:3573",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3577",
          "name" : "RHSA-2025:3577",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:3780",
          "name" : "RHSA-2025:3780",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:4422",
          "name" : "RHSA-2025:4422",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:7702",
          "name" : "RHSA-2025:7702",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0624",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0624",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346112",
          "name" : "RHBZ#2346112",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250516-0006/",
          "name" : "https://security.netapp.com/advisory/ntap-20250516-0006/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. During the network boot process, when trying to search for the configuration file, grub copies data from a user controlled environment variable into an internal buffer using the grub_strcpy() function. During this step, it fails to consider the environment variable length when allocating the internal buffer, resulting in an out-of-bounds write. If correctly exploited, this issue may result in remote code execution through the same network segment grub is searching for the boot information, which can be used to by-pass secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T19:15Z",
    "lastModifiedDate" : "2025-05-21T15:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0625",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Insecure%20Direct%20Object%20Reference%20(IDOR)%20-%20All%20Student%20Homework%20Downloadable.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Insecure%20Direct%20Object%20Reference%20(IDOR)%20-%20All%20Student%20Homework%20Downloadable.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Insecure%20Direct%20Object%20Reference%20(IDOR)%20-%20All%20Student%20Homework%20Downloadable.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Insecure%20Direct%20Object%20Reference%20(IDOR)%20-%20All%20Student%20Homework%20Downloadable.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.292737",
          "name" : "VDB-292737 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.292737",
          "name" : "VDB-292737 | CampCodes School Management Software Attachment resource injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.484917",
          "name" : "Submit #484917 | CampCodes School Management Software 1.0 Insecure Direct Object Reference (IDOR)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in CampCodes School Management Software 1.0. This affects an unknown part of the component Attachment Handler. The manipulation leads to improper control of resource identifiers. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T02:15Z",
    "lastModifiedDate" : "2025-03-28T19:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0626",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/",
          "name" : "https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor",
          "name" : "https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "name" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "name" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The \"monitor\" binary in the firmware of the affected product attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function also enables the network interface of the device if it is disabled. The function is triggered by attempting to update the device from the user menu. This could serve as a backdoor to the device, and could lead to a malicious actor being able to upload and overwrite files on the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T19:15Z",
    "lastModifiedDate" : "2025-03-01T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0627",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/30fbe3c5-f190-48e8-a6bb-e8d78e001e7f/",
          "name" : "https://wpscan.com/vulnerability/30fbe3c5-f190-48e8-a6bb-e8d78e001e7f/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WordPress Tag, Category, and Taxonomy Manager  WordPress plugin before 3.30.0 does not sanitise and escape some of its Widgets settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:taxopress:taxopress:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.30.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-28T06:15Z",
    "lastModifiedDate" : "2025-04-30T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0628",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/berriai/litellm/commit/566d9354aab4215091b2e51ad0333e948125fa1b",
          "name" : "https://github.com/berriai/litellm/commit/566d9354aab4215091b2e51ad0333e948125fa1b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://huntr.com/bounties/6c0e2f75-2d03-42f9-9530-e16a973317fc",
          "name" : "https://huntr.com/bounties/6c0e2f75-2d03-42f9-9530-e16a973317fc",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper authorization vulnerability exists in the main-latest version of BerriAI/litellm. When a user with the role 'internal_user_viewer' logs into the application, they are provided with an overly privileged API key. This key can be used to access all the admin functionality of the application, including endpoints such as '/users/list' and '/users/get_users'. This vulnerability allows for privilege escalation within the application, enabling any account to become a PROXY ADMIN."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-20T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0629",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
          "name" : "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
          "name" : "https://wpscan.com/vulnerability/39c36d6d-5522-422b-b890-524e27e67f7c/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Coronavirus (COVID-19) Notice Message WordPress plugin through 1.1.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gallagherwebsitedesign:coronavirus_\\(covid-19\\)_notice_message:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T06:15Z",
    "lastModifiedDate" : "2025-05-21T19:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0630",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple Western Telematic (WTI) products contain a web interface that is vulnerable to a local file inclusion attack (LFI), where any authenticated user has privileged access to files on the device's filesystem."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T20:15Z",
    "lastModifiedDate" : "2025-02-04T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0631",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1717.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1717.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Credential Exposure Vulnerability exists in the above-mentioned product and version. The vulnerability is due to using HTTP resulting in credentials being sent in clear text."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T19:15Z",
    "lastModifiedDate" : "2025-01-28T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0632",
        "ASSIGNER" : "cve-coordination@monash.edu"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://formulatrix.com/downloads/apps/repository/rockmaker/RockMaker%20V3/3.18/3.18.4.7/RockMakerWeb_3.18.4.7_setup.exe",
          "name" : "https://formulatrix.com/downloads/apps/repository/rockmaker/RockMaker%20V3/3.18/3.18.4.7/RockMakerWeb_3.18.4.7_setup.exe",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://formulatrix.com/downloads/docs/cve/RockMaker/CVE-2025-0632_Security_Bulletin.pdf",
          "name" : "https://formulatrix.com/downloads/docs/cve/RockMaker/CVE-2025-0632_Security_Bulletin.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.formulatrix.com/downloads/apps/repository/rockmaker/",
          "name" : "https://www.formulatrix.com/downloads/apps/repository/rockmaker/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Local File Inclusion (LFI) vulnerability in a Render function of Formulatrix Rock Maker Web (RMW) allows a remote attacker to obtain sensitive data via arbitrary code execution. A malicious actor could execute malicious scripts to automatically download configuration files in known locations to exfiltrate data including credentials, and with no rate limiting a malicious actor could enumerate the filesystem of the host machine and potentially lead to full host compromise.\n\nThis issue affects Rock Maker Web: from 3.2.1.1 and later"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-21T06:15Z",
    "lastModifiedDate" : "2025-04-28T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0633",
        "ASSIGNER" : "PSIRT@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/iniparser/iniparser/-/issues/177",
          "name" : "https://gitlab.com/iniparser/iniparser/-/issues/177",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based Buffer Overflow vulnerability in iniparser_dumpsection_ini() in iniparser allows attacker to read out of bound memory"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T07:15Z",
    "lastModifiedDate" : "2025-02-19T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0634",
        "ASSIGNER" : "PSIRT@samsung.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Samsung/rlottie/pull/571",
          "name" : "https://github.com/Samsung/rlottie/pull/571",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Samsung Open Source rLottie allows Remote Code Inclusion.This issue affects rLottie: V0.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:samsung:rlottie:0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-30T02:15Z",
    "lastModifiedDate" : "2025-07-08T14:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0635",
        "ASSIGNER" : "security@m-files.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://product.m-files.com/security-advisories/cve-2025-0635/",
          "name" : "https://product.m-files.com/security-advisories/cve-2025-0635/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Denial of service condition in M-Files Server in versions before \n\n25.1.14445.5 allows an unauthenticated user to consume computing resources in certain conditions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-23T11:15Z",
    "lastModifiedDate" : "2025-01-23T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0637",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-beta10",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/inadequate-access-control-beta10",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "It has been found that the Beta10 software does not provide for proper authorisation control in multiple areas of the application. This deficiency could allow a malicious actor, without authentication, to access private areas and/or areas intended for other roles. The vulnerability has been identified at least in the file or path ‘/app/tools.html’."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-23T16:15Z",
    "lastModifiedDate" : "2025-01-23T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0638",
        "ASSIGNER" : "sep@nlnetlabs.nl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nlnetlabs.nl/downloads/routinator/CVE-2025-0638.txt",
          "name" : "https://www.nlnetlabs.nl/downloads/routinator/CVE-2025-0638.txt",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The initial code parsing the manifest did not check the content of the file names yet later code assumed that it was checked and panicked when encountering illegal characters, resulting in a crash of Routinator."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T16:15Z",
    "lastModifiedDate" : "2025-01-22T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0639",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514507",
          "name" : "GitLab Issue #514507",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2946553",
          "name" : "HackerOne Bug Bounty Report #2946553",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered affecting service availability via issue preview in GitLab CE/EE affecting all versions from 16.7 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.7.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.7.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-24T08:15Z",
    "lastModifiedDate" : "2025-08-08T16:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0646",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-09T23:15Z",
    "lastModifiedDate" : "2025-07-09T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0648",
        "ASSIGNER" : "security@m-files.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://product.m-files.com/security-advisories/cve-2025-0648/",
          "name" : "https://product.m-files.com/security-advisories/cve-2025-0648/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unexpected server crash in database driver in M-Files Server before 25.1.14445.5 and before 24.8 LTS SR3  allows a highly privileged attacker to cause denial of service via configuration change."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-23T11:15Z",
    "lastModifiedDate" : "2025-02-17T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0649",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/tensorflow/serving/commit/6cb013167d13f2ed3930aabb86dbc2c8c53f5adf",
          "name" : "https://github.com/tensorflow/serving/commit/6cb013167d13f2ed3930aabb86dbc2c8c53f5adf",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect JSON input stringification in Google's Tensorflow serving versions up to 2.18.0 allows for potentially unbounded recursion leading to server crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:tensorflow_serving:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.18.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-06T21:16Z",
    "lastModifiedDate" : "2025-07-31T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0650",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/01/22/11",
          "name" : "http://www.openwall.com/lists/oss-security/2025/01/22/11",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1083",
          "name" : "RHSA-2025:1083",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1084",
          "name" : "RHSA-2025:1084",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1085",
          "name" : "RHSA-2025:1085",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1086",
          "name" : "RHSA-2025:1086",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1087",
          "name" : "RHSA-2025:1087",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1088",
          "name" : "RHSA-2025:1088",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1089",
          "name" : "RHSA-2025:1089",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1090",
          "name" : "RHSA-2025:1090",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1091",
          "name" : "RHSA-2025:1091",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1092",
          "name" : "RHSA-2025:1092",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1093",
          "name" : "RHSA-2025:1093",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1094",
          "name" : "RHSA-2025:1094",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1095",
          "name" : "RHSA-2025:1095",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1096",
          "name" : "RHSA-2025:1096",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1097",
          "name" : "RHSA-2025:1097",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0650",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0650",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2339537",
          "name" : "RHBZ#2339537",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.openwall.com/lists/oss-security/2025/01/22/5",
          "name" : "https://www.openwall.com/lists/oss-security/2025/01/22/5",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the Open Virtual Network (OVN). Specially crafted UDP packets may bypass egress access control lists (ACLs) in OVN installations configured with a logical switch with DNS records set on it and if the same switch has any egress ACLs configured. This issue can lead to unauthorized access to virtual machines and containers running on the OVN network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-23T17:15Z",
    "lastModifiedDate" : "2025-02-06T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0651",
        "ASSIGNER" : "cna@cloudflare.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developers.cloudflare.com/warp-client/",
          "name" : "https://developers.cloudflare.com/warp-client/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Privilege Management vulnerability in Cloudflare WARP on Windows allows File Manipulation.\n\nUser with a low system privileges  can create a set of symlinks inside the C:\\ProgramData\\Cloudflare\\warp-diag-partials folder. After triggering the 'Reset all settings\" option the WARP service will delete the files that the symlink was pointing to. Given the WARP service operates with System privileges this might lead to deleting files owned by the System user.\nThis issue affects WARP: before 2024.12.492.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cloudflare:warp:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "2024.12.492.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-01-22T18:15Z",
    "lastModifiedDate" : "2025-07-31T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0652",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514532",
          "name" : "GitLab Issue #514532",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2947863",
          "name" : "HackerOne Bug Bounty Report #2947863",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE/CE affecting all versions starting from 16.9 before 17.7.7, all versions starting from 17.8 before 17.8.5, all versions starting from 17.9 before 17.9.2 could allow unauthorized users to access confidential information intended for internal use only."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.9.0",
          "versionEndExcluding" : "17.7.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.9.0",
          "versionEndExcluding" : "17.7.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-13T06:15Z",
    "lastModifiedDate" : "2025-08-08T01:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0654",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0655",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CVE ID NUMBER. The Rejected CVE Record is a duplicate of CVE-2024-55890. Notes: All CVE users should reference CVE-2024-55890 instead of this CVE Record. All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-04-15T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0659",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1715.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1715.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A path\ntraversal vulnerability exists in the Rockwell Automation DataEdge Platform DataMosaix Private Cloud. By specifying the character\nsequence in the body of the vulnerable endpoint, it is possible to overwrite\nfiles outside of the intended directory. A threat actor with admin privileges could\nleverage this vulnerability to overwrite reports including user projects."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T16:15Z",
    "lastModifiedDate" : "2025-01-28T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0660",
        "ASSIGNER" : "security@concretecms.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://documentation.concretecms.org/9-x/developers/introduction/version-history/940-release-notes",
          "name" : "https://documentation.concretecms.org/9-x/developers/introduction/version-history/940-release-notes",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/concretecms/bedrock/pull/370",
          "name" : "https://github.com/concretecms/bedrock/pull/370",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/concretecms/concretecms/pull/12454",
          "name" : "https://github.com/concretecms/concretecms/pull/12454",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Concrete CMS versions 9.0.0 through 9.3.9 are affected by a stored XSS in Folder Function.The \"Add Folder\" functionality lacks input sanitization, allowing a rogue admin to inject XSS payloads as folder names.  The Concrete CMS security team gave this vulnerability a CVSS 4.0 Score of 4.8 with vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:N/VA:N/SC:L/SI:N/SA:N. Versions below 9 are not affected. Thanks, Alfin Joseph for reporting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-10T21:15Z",
    "lastModifiedDate" : "2025-03-10T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0661",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3236114/dethemekit-for-elementor/trunk/admin/includes/dep/admin-helper.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3236114/dethemekit-for-elementor/trunk/admin/includes/dep/admin-helper.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e2c937c-1ff8-4bcc-913b-83bade37d754?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1e2c937c-1ff8-4bcc-913b-83bade37d754?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The DethemeKit For Elementor plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 2.36 via the duplicate_post() function due to insufficient restrictions on which posts can be duplicated. This makes it possible for authenticated attackers, with Contributor-level access and above, to extract data from password protected, private, draft, or scheduled posts that they should not have access to by duplicating the post."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.1.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-13T07:15Z",
    "lastModifiedDate" : "2025-02-24T17:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0662",
        "ASSIGNER" : "secteam@freebsd.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.freebsd.org/advisories/FreeBSD-SA-25:04.ktrace.asc",
          "name" : "https://security.freebsd.org/advisories/FreeBSD-SA-25:04.ktrace.asc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250207-0006/",
          "name" : "https://security.netapp.com/advisory/ntap-20250207-0006/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In some cases, the ktrace facility will log the contents of kernel structures to userspace.  In one such case, ktrace dumps a variable-sized sockaddr to userspace.  There, the full sockaddr is copied, even when it is shorter than the full size.  This can result in up to 14 uninitialized bytes of kernel memory being copied out to userspace.\n\nIt is possible for an unprivileged userspace program to leak 14 bytes of a kernel heap allocation to userspace."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T05:15Z",
    "lastModifiedDate" : "2025-02-07T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0664",
        "ASSIGNER" : "trellixpsirt@trellix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://thrive.trellix.com/s/article/000014450",
          "name" : "https://thrive.trellix.com/s/article/000014450",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A locally authenticated, privileged user can craft a malicious OpenSSL configuration file, potentially leading the agent to load an arbitrary local library. This may impair endpoint defenses and allow the attacker to achieve code execution with SYSTEM-level privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-21T07:15Z",
    "lastModifiedDate" : "2025-07-21T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0665",
        "ASSIGNER" : "cve@curl.se"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/05/2",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/05/2",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/05/5",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/05/5",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        }, {
          "url" : "https://curl.se/docs/CVE-2025-0665.html",
          "name" : "www",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://curl.se/docs/CVE-2025-0665.json",
          "name" : "json",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://hackerone.com/reports/2954286",
          "name" : "issue",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250306-0007/",
          "name" : "https://security.netapp.com/advisory/ntap-20250306-0007/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "libcurl would wrongly close the same eventfd file descriptor twice when taking\ndown a connection channel after having completed a threaded name resolve."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:haxx:curl:8.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:hci_compute_node:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h300s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h300s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h410c_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h410c:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h410s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h410s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h500s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h500s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:h700s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:h700s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T10:15Z",
    "lastModifiedDate" : "2025-07-30T19:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0666",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_01_CSNC-2025-002_BOINC_multiple_XSS.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_01_CSNC-2025-002_BOINC_multiple_XSS.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_01_CSNC-2025-002_BOINC_multiple_XSS.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_01_CSNC-2025-002_BOINC_multiple_XSS.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: through 1.4.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.4.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-07T08:15Z",
    "lastModifiedDate" : "2025-07-08T16:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0667",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_02_CSNC-2025-003_BOINC_stored_XSS.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_02_CSNC-2025-003_BOINC_stored_XSS.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_02_CSNC-2025-003_BOINC_stored_XSS.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_02_CSNC-2025-003_BOINC_stored_XSS.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: through 1.4.7."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.4.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-07T08:15Z",
    "lastModifiedDate" : "2025-07-08T16:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0668",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_03_CSNC-2025-004_BOINC_multiple_SQLi.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_03_CSNC-2025-004_BOINC_multiple_SQLi.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_03_CSNC-2025-004_BOINC_multiple_SQLi.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_03_CSNC-2025-004_BOINC_multiple_SQLi.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in BOINC Server allows Stored XSS.This issue affects BOINC Server: before 1.4.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-07T08:15Z",
    "lastModifiedDate" : "2025-07-08T16:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0669",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_04_CSNC-2025-005_BOINC_CSRF.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_04_CSNC-2025-005_BOINC_CSRF.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_04_CSNC-2025-005_BOINC_CSRF.txt",
          "name" : "https://www.compass-security.com/fileadmin/Research/Advisories/2025_04_CSNC-2025-005_BOINC_CSRF.txt",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Request Forgery (CSRF) vulnerability in BOINC Server allows Cross Site Request Forgery.This issue affects BOINC Server: before 1.4.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:universityofcalifornia:boinc_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.4.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-07T08:15Z",
    "lastModifiedDate" : "2025-07-08T16:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0671",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/f4e04f01-31cb-4f5e-9739-12f803600e60/",
          "name" : "https://wpscan.com/vulnerability/f4e04f01-31cb-4f5e-9739-12f803600e60/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Icegram Express  WordPress plugin before 5.7.50 does not sanitise and escape some of its Template settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:icegram:icegram_express:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.7.50",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-25T06:15Z",
    "lastModifiedDate" : "2025-04-29T21:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0673",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514732",
          "name" : "GitLab Issue #514732",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/2936949",
          "name" : "HackerOne Bug Bounty Report #2936949",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.7 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2, allow an attacker to trigger an infinite redirect loop, potentially leading to a denial of service condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.10.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.10.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-12T11:15Z",
    "lastModifiedDate" : "2025-08-08T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0674",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-03",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-03",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple Elber products are affected by an authentication bypass \nvulnerability which allows unauthorized access to the password \nmanagement functionality. Attackers can exploit this issue by \nmanipulating the endpoint to overwrite any user's password within the \nsystem. This grants them unauthorized administrative access to protected\n areas of the application, compromising the device's system security."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T00:15Z",
    "lastModifiedDate" : "2025-02-07T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0675",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-912"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-03",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-03",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple Elber products suffer from an unauthenticated device configuration and client-side hidden functionality disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T00:15Z",
    "lastModifiedDate" : "2025-02-07T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0676",
        "ASSIGNER" : "psirt@moxa.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-259491-cve-2025-0676-command-injection-leading-to-privilege-escalation",
          "name" : "https://www.moxa.com/en/support/product-support/security-advisory/mpsa-259491-cve-2025-0676-command-injection-leading-to-privilege-escalation",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability involves command injection in tcpdump within Moxa products, enabling an authenticated attacker with console access to exploit improper input validation to inject and execute systems commands. Successful exploitation could result in privilege escalation, allowing the attacker to gain root shell access and maintain persistent control over the device, potentially disrupting network services and affecting the availability of downstream systems that rely on its connectivity."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-02T07:15Z",
    "lastModifiedDate" : "2025-04-02T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0677",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:6990",
          "name" : "RHSA-2025:6990",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0677",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0677",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346116",
          "name" : "RHBZ#2346116",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. When performing a symlink lookup, the grub's UFS module checks the inode's data size to allocate the internal buffer to read the file content, however, it fails to check if the symlink data size has overflown. When this occurs, grub_malloc() may be called with a smaller value than needed. When further reading the data from the disk into the buffer, the grub_ufs_lookup_symlink() function will write past the end of the allocated size. An attack can leverage this by crafting a malicious filesystem, and as a result, it will corrupt data stored in the heap, allowing for arbitrary code execution used to by-pass secure boot mechanisms."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T19:15Z",
    "lastModifiedDate" : "2025-05-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0678",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0678",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0678",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346118",
          "name" : "RHBZ#2346118",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. When reading data from a squash4 filesystem, grub's squash4 fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the direct_read() will perform a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.12",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:7.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_container_platform:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-03-25T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0679",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-359"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/514751",
          "name" : "GitLab Issue #514751",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2952536",
          "name" : "HackerOne Bug Bounty Report #2952536",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.1 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. Under certain conditions un-authorised users can view full email addresses that should be partially obscured."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.1.0",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.1.0",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-22T15:16Z",
    "lastModifiedDate" : "2025-05-29T15:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0680",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.newrocktech.com/ContactUs/index.html",
          "name" : "https://www.newrocktech.com/ContactUs/index.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Affected products contain a vulnerability in the device cloud rpc command handling process that could allow remote attackers to take control over arbitrary devices connected to the cloud."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T19:15Z",
    "lastModifiedDate" : "2025-01-30T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0681",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-155"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-030-02",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.newrocktech.com/ContactUs/index.html",
          "name" : "https://www.newrocktech.com/ContactUs/index.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Cloud MQTT service of the affected products supports wildcard topic \nsubscription which could allow an attacker to obtain sensitive \ninformation from tapping the service communications."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T19:15Z",
    "lastModifiedDate" : "2025-01-30T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0682",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/qwery-multipurpose-business-wordpress-theme/29678687",
          "name" : "https://themeforest.net/item/qwery-multipurpose-business-wordpress-theme/29678687",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/15a9718f-f877-4e33-8f7a-950791c4ca85?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/15a9718f-f877-4e33-8f7a-950791c4ca85?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ThemeREX Addons plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.33.0 via the 'trx_sc_reviews' shortcode 'type' attribute. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themerex:addons:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.34.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-25T06:15Z",
    "lastModifiedDate" : "2025-08-08T02:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0683",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/",
          "name" : "https://www.bleepingcomputer.com/news/security/backdoor-found-in-two-healthcare-patient-monitors-linked-to-ip-in-china/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor",
          "name" : "https://www.cisa.gov/resources-tools/resources/contec-cms8000-contains-backdoor",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "name" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "name" : "https://www.fda.gov/medical-devices/safety-communications/cybersecurity-vulnerabilities-certain-patient-monitors-contec-and-epsimed-fda-safety-communication",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In its default configuration, Contec Health CMS8000 Patient Monitor transmits plain-text \npatient data to a hard-coded public IP address when a patient is hooked \nup to the monitor. This could lead to a leakage of confidential patient \ndata to any device with that IP address or an attacker in a \nmachine-in-the-middle scenario."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T19:15Z",
    "lastModifiedDate" : "2025-01-31T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0684",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0684",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0684",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346119",
          "name" : "RHBZ#2346119",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. When performing a symlink lookup from a reiserfs filesystem, grub's reiserfs fs module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_reiserfs_read_symlink() will call grub_reiserfs_read_real() with a overflown length parameter, leading to a heap based out-of-bounds write during data reading. This flaw may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution, by-passing secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T18:15Z",
    "lastModifiedDate" : "2025-07-28T17:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0685",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0685",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0685",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346120",
          "name" : "RHBZ#2346120",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. When reading data from a jfs filesystem, grub's jfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_jfs_lookup_symlink() function will write past the internal buffer length during grub_jfs_read_file(). This issue can be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution, by-passing secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T18:15Z",
    "lastModifiedDate" : "2025-07-28T17:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0686",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0686",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0686",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346121",
          "name" : "RHBZ#2346121",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. When performing a symlink lookup from a romfs filesystem, grub's romfs filesystem module uses user-controlled parameters from the filesystem geometry to determine the internal buffer size, however, it improperly checks for integer overflows. A maliciously crafted filesystem may lead some of those buffer size calculations to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result, the grub_romfs_read_symlink() may cause out-of-bounds writes when the calling grub_disk_read() function. This issue may be leveraged to corrupt grub's internal critical data and can result in arbitrary code execution by-passing secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T18:15Z",
    "lastModifiedDate" : "2025-07-28T17:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0687",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/3c1e21e1-32f2-4a20-9262-80e1cdab534d/",
          "name" : "https://wpscan.com/vulnerability/3c1e21e1-32f2-4a20-9262-80e1cdab534d/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/3c1e21e1-32f2-4a20-9262-80e1cdab534d/",
          "name" : "https://wpscan.com/vulnerability/3c1e21e1-32f2-4a20-9262-80e1cdab534d/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Spiritual Gifts Survey (and optional S.H.A.P.E survey) WordPress plugin through 0.9.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mynamedia:spiritual_gifts_survey_\\(and_optional_s.h.a.p.e_survey\\):*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "0.9.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-05-28T15:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0688",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/1e2b77c3-ad45-4734-998a-c1722ebd1f4f/",
          "name" : "https://wpscan.com/vulnerability/1e2b77c3-ad45-4734-998a-c1722ebd1f4f/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/1e2b77c3-ad45-4734-998a-c1722ebd1f4f/",
          "name" : "https://wpscan.com/vulnerability/1e2b77c3-ad45-4734-998a-c1722ebd1f4f/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Spiritual Gifts Survey (and optional S.H.A.P.E survey) WordPress plugin through 0.9.10 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mynamedia:spiritual_gifts_survey_\\(and_optional_s.h.a.p.e_survey\\):*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "0.9.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-05-28T15:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0689",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0689",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0689",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346122",
          "name" : "RHBZ#2346122",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
          "name" : "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When reading data from disk, the grub's UDF filesystem module utilizes the user controlled data length metadata to allocate its internal buffers. In certain scenarios, while iterating through disk sectors, it assumes the read size from the disk is always smaller than the allocated buffer size which is not guaranteed. A crafted filesystem image may lead to a heap-based buffer overflow resulting in critical data to be corrupted, resulting in the risk of arbitrary code execution by-passing secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T15:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0690",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:6990",
          "name" : "RHSA-2025:6990",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0690",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0690",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346123",
          "name" : "RHBZ#2346123",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
          "name" : "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The read command is used to read the keyboard input from the user, while reads it keeps the input length in a 32-bit integer value which is further used to reallocate the line buffer to accept the next character. During this process, with a line big enough it's possible to make this variable to overflow leading to a out-of-bounds write in the heap based buffer. This flaw may be leveraged to corrupt grub's internal critical data and secure boot bypass is not discarded as consequence."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-24T08:15Z",
    "lastModifiedDate" : "2025-05-13T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0691",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0011/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0011/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in permissions component in Devolutions Server 2025.1.10.0 and earlier allows an authenticated user to bypass the \"Edit permission\" permission by bypassing the client side validation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2025.1.10.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-05T14:15Z",
    "lastModifiedDate" : "2025-07-02T13:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0692",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/176f329b-a861-4ab0-ad1d-02f750f9b691/",
          "name" : "https://wpscan.com/vulnerability/176f329b-a861-4ab0-ad1d-02f750f9b691/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Simple Video Management System WordPress plugin through 1.0.4 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:maximize:simple_video_management_system:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.0.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T06:15Z",
    "lastModifiedDate" : "2025-05-26T01:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0693",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-002/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-002/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Variable response times in the AWS Sign-in IAM user login flow allowed for the use of brute force enumeration techniques to identify valid IAM usernames in an arbitrary AWS account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-23T22:15Z",
    "lastModifiedDate" : "2025-01-23T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0694",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.vde.com/en/advisories/VDE-2025-015",
          "name" : "https://cert.vde.com/en/advisories/VDE-2025-015",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient path validation in CODESYS Control allows low privileged attackers with physical access to gain full filesystem access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-18T11:15Z",
    "lastModifiedDate" : "2025-03-18T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0695",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0695",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0695",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Allocation of Resources Without Limits or Throttling vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-27T11:15Z",
    "lastModifiedDate" : "2025-01-27T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0696",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0696",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-0696",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A NULL Pointer Dereference vulnerability in Cesanta Frozen versions less than 1.7 allows an attacker to induce a crash of the component embedding the library by supplying a maliciously crafted JSON as input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-27T11:15Z",
    "lastModifiedDate" : "2025-01-27T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0697",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-74"
          }, {
            "lang" : "en",
            "value" : "CWE-707"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/bloodbile/Telstra-RHI",
          "name" : "https://github.com/bloodbile/Telstra-RHI",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293223",
          "name" : "VDB-293223 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293223",
          "name" : "VDB-293223 | Telstra Smart Modem Gen 2 HTTP Header injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480045",
          "name" : "Submit #480045 | Telstra Smart Modem Generation 2 HTTP Response Header Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Telstra Smart Modem Gen 2 up to 20250115. This affects an unknown part of the component HTTP Header Handler. The manipulation of the argument Content-Disposition leads to injection. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-24T15:15Z",
    "lastModifiedDate" : "2025-01-24T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0698",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/19",
          "name" : "https://github.com/JoeyBling/bootplus/issues/19",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/19#issue-2786879797",
          "name" : "https://github.com/JoeyBling/bootplus/issues/19#issue-2786879797",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293226",
          "name" : "VDB-293226 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293226",
          "name" : "VDB-293226 | JoeyBling bootplus list sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480827",
          "name" : "Submit #480827 | JoeyBling bootplus 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been classified as critical. Affected is an unknown function of the file /admin/sys/menu/list. The manipulation of the argument sort/order leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-24T16:15Z",
    "lastModifiedDate" : "2025-01-24T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0699",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/21",
          "name" : "https://github.com/JoeyBling/bootplus/issues/21",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/21#issue-2786893665",
          "name" : "https://github.com/JoeyBling/bootplus/issues/21#issue-2786893665",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293227",
          "name" : "VDB-293227 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293227",
          "name" : "VDB-293227 | JoeyBling bootplus list sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480836",
          "name" : "Submit #480836 | JoeyBling bootplus 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/sys/role/list. The manipulation of the argument sort leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-24T16:15Z",
    "lastModifiedDate" : "2025-01-24T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0700",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/22",
          "name" : "https://github.com/JoeyBling/bootplus/issues/22",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/22#issue-2786899884",
          "name" : "https://github.com/JoeyBling/bootplus/issues/22#issue-2786899884",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293228",
          "name" : "VDB-293228 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293228",
          "name" : "VDB-293228 | JoeyBling bootplus list sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480838",
          "name" : "Submit #480838 | JoeyBling bootplus 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/sys/log/list. The manipulation of the argument logId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-24T17:15Z",
    "lastModifiedDate" : "2025-01-24T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0701",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/23",
          "name" : "https://github.com/JoeyBling/bootplus/issues/23",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/23#issue-2786909921",
          "name" : "https://github.com/JoeyBling/bootplus/issues/23#issue-2786909921",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293229",
          "name" : "VDB-293229 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293229",
          "name" : "VDB-293229 | JoeyBling bootplus list sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480839",
          "name" : "Submit #480839 | JoeyBling bootplus 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This affects an unknown part of the file /admin/sys/user/list. The manipulation of the argument sort leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-24T17:15Z",
    "lastModifiedDate" : "2025-01-24T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0702",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/24",
          "name" : "https://github.com/JoeyBling/bootplus/issues/24",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432",
          "name" : "https://github.com/JoeyBling/bootplus/issues/24#issue-2786919432",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293230",
          "name" : "VDB-293230 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293230",
          "name" : "VDB-293230 | JoeyBling bootplus SysFileController.java unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480841",
          "name" : "Submit #480841 | JoeyBling bootplus 1.0 upload any file",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This vulnerability affects unknown code of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument portraitFile leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-24T18:15Z",
    "lastModifiedDate" : "2025-01-24T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0703",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/25",
          "name" : "https://github.com/JoeyBling/bootplus/issues/25",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/25#issue-2786928618",
          "name" : "https://github.com/JoeyBling/bootplus/issues/25#issue-2786928618",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293231",
          "name" : "VDB-293231 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293231",
          "name" : "VDB-293231 | JoeyBling bootplus SysFileController.java path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480842",
          "name" : "Submit #480842 | JoeyBling bootplus 1.0 any file download available",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. This issue affects some unknown processing of the file src/main/java/io/github/controller/SysFileController.java. The manipulation of the argument name leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-24T19:15Z",
    "lastModifiedDate" : "2025-01-24T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0704",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          }, {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/26",
          "name" : "https://github.com/JoeyBling/bootplus/issues/26",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/26#issue-2786934642",
          "name" : "https://github.com/JoeyBling/bootplus/issues/26#issue-2786934642",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293232",
          "name" : "VDB-293232 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293232",
          "name" : "VDB-293232 | JoeyBling bootplus QrCodeController.java qrCode resource consumption",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480843",
          "name" : "Submit #480843 | JoeyBling bootplus 1.0 DDOS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d. Affected is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument w/h leads to resource consumption. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-24T19:15Z",
    "lastModifiedDate" : "2025-01-24T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0705",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/27",
          "name" : "https://github.com/JoeyBling/bootplus/issues/27",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/27#issue-2786941847",
          "name" : "https://github.com/JoeyBling/bootplus/issues/27#issue-2786941847",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293233",
          "name" : "VDB-293233 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293233",
          "name" : "VDB-293233 | JoeyBling bootplus QrCodeController.java qrCode redirect",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480844",
          "name" : "Submit #480844 | JoeyBling bootplus 1.0 URL redirection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this vulnerability is the function qrCode of the file src/main/java/io/github/controller/QrCodeController.java. The manipulation of the argument text leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-24T19:15Z",
    "lastModifiedDate" : "2025-01-24T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0706",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/JoeyBling/bootplus/issues/28",
          "name" : "https://github.com/JoeyBling/bootplus/issues/28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/28",
          "name" : "https://github.com/JoeyBling/bootplus/issues/28",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/28#issue-2786945699",
          "name" : "https://github.com/JoeyBling/bootplus/issues/28#issue-2786945699",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JoeyBling/bootplus/issues/28#issue-2786945699",
          "name" : "https://github.com/JoeyBling/bootplus/issues/28#issue-2786945699",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293234",
          "name" : "VDB-293234 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293234",
          "name" : "VDB-293234 | JoeyBling bootplus admin.html cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480845",
          "name" : "Submit #480845 | JoeyBling bootplus 1.0 XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in JoeyBling bootplus up to 247d5f6c209be1a5cf10cd0fa18e1d8cc63cf55d and classified as problematic. Affected by this issue is some unknown functionality of the file /admin/sys/admin.html. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-24T20:15Z",
    "lastModifiedDate" : "2025-01-24T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0707",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293235",
          "name" : "VDB-293235 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293235",
          "name" : "VDB-293235 | Rise Group Rise Mode Temp CPU Startup CRYPTBASE.dll untrusted search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.481088",
          "name" : "Submit #481088 | Rise Group Rise Mode Temp CPU 2.1 OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Rise Group Rise Mode Temp CPU 2.1. It has been classified as critical. This affects an unknown part in the library CRYPTBASE.dll of the component Startup. The manipulation leads to untrusted search path. The attack needs to be approached locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-24T20:15Z",
    "lastModifiedDate" : "2025-01-24T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0708",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/fumiao/opencms/issues/IBI2XM",
          "name" : "https://gitee.com/fumiao/opencms/issues/IBI2XM",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293236",
          "name" : "VDB-293236 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293236",
          "name" : "VDB-293236 | fumiao opencms Add Model Management Page addOrUpdate cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.482662",
          "name" : "Submit #482662 | opencms CMS 2.2 XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in fumiao opencms 2.2. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/model/addOrUpdate of the component Add Model Management Page. The manipulation of the argument ???? leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-24T20:15Z",
    "lastModifiedDate" : "2025-01-24T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0709",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/taynes-llllzt/taynes/issues/7",
          "name" : "https://github.com/taynes-llllzt/taynes/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/taynes-llllzt/taynes/issues/7#issue-2792259251",
          "name" : "https://github.com/taynes-llllzt/taynes/issues/7#issue-2792259251",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293237",
          "name" : "VDB-293237 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293237",
          "name" : "VDB-293237 | Dcat-Admin Roles Page roles cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483364",
          "name" : "Submit #483364 | Dcat Dcat-Admin v2.2.1-beta stored xss",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Dcat-Admin 2.2.1-beta. It has been rated as problematic. This issue affects some unknown processing of the file /admin/auth/roles of the component Roles Page. The manipulation leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dcatadmin:dcat_admin:2.2.1:beta:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-24T21:15Z",
    "lastModifiedDate" : "2025-05-07T20:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0710",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/anamika126/Stackofvulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting%20-%20Notice%20Board.pdf",
          "name" : "https://github.com/anamika126/Stackofvulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting%20-%20Notice%20Board.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293238",
          "name" : "VDB-293238 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293238",
          "name" : "VDB-293238 | CampCodes School Management Software Notice Board Page notice-list cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484934",
          "name" : "Submit #484934 | CampCodes School Management Software  1.0 Stored Cross Site Scripting Vulnerability (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /notice-list of the component Notice Board Page. The manipulation of the argument Notice leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-24T21:15Z",
    "lastModifiedDate" : "2025-02-21T21:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0712",
        "ASSIGNER" : "security@elastic.co"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.elastic.co/t/beats-windows-installer-9-1-0-security-update-esa-2025-12/380558",
          "name" : "https://discuss.elastic.co/t/beats-windows-installer-9-1-0-security-update-esa-2025-12/380558",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An uncontrolled search path element vulnerability can lead to local privilege Escalation (LPE) via Insecure Directory Permissions. The vulnerability arises from improper handling of directory permissions. An attacker with local access may exploit this flaw to move and delete arbitrary files, potentially gaining SYSTEM privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-30T01:15Z",
    "lastModifiedDate" : "2025-07-30T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0714",
        "ASSIGNER" : "cve-request@cirosec.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cirosec.de/sa/sa-2024-012",
          "name" : "https://www.cirosec.de/sa/sa-2024-012",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The vulnerability exists in the password storage of Mobateks MobaXterm in versions below 25.0. MobaXTerm uses an initialisation vector (IV) consisting only of zero bytes and a master key to encrypt each password individually. In the default configuration, on opening MobaXTerm, the user is prompted for their password. A derivative of the password is used as the master key. As both the master key and the IV are the same for each stored password, the AES CFB ciphertext depends only on the plaintext (the password). The static IV and master key make it easier to obtain sensitive information and to decrypt data when it is stored at rest."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T12:15Z",
    "lastModifiedDate" : "2025-02-19T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0716",
        "ASSIGNER" : "disclosures@herodevs.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915",
          "name" : "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915",
          "name" : "https://codepen.io/herodevs/pen/qEWQmpd/a86a0d29310e12c7a3756768e6c7b915",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-0716",
          "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-0716",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-0716",
          "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-0716",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper sanitization of the value of the 'href' and 'xlink:href' attributes in '<image>' SVG elements in AngularJS allows attackers to bypass common image source restrictions. This can lead to a form of  Content Spoofing https://owasp.org/www-community/attacks/Content_Spoofing  and also negatively affect the application's performance and behavior by using too large or slow-to-load images.\n\nThis issue affects all versions of AngularJS.\n\nNote:\nThe AngularJS project is End-of-Life and will not receive any updates to address this issue. For more information see  here https://docs.angularjs.org/misc/version-support-status ."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-29T17:15Z",
    "lastModifiedDate" : "2025-05-02T13:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0717",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/31f734fc-d474-46b3-98eb-04761cab8878/",
          "name" : "https://wpscan.com/vulnerability/31f734fc-d474-46b3-98eb-04761cab8878/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "To exploit the vulnerability, it is necessary:"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T06:15Z",
    "lastModifiedDate" : "2025-03-25T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0718",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/69ddd8eb-33f1-49cf-9428-3d89262b1887/",
          "name" : "https://wpscan.com/vulnerability/69ddd8eb-33f1-49cf-9428-3d89262b1887/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/69ddd8eb-33f1-49cf-9428-3d89262b1887/",
          "name" : "https://wpscan.com/vulnerability/69ddd8eb-33f1-49cf-9428-3d89262b1887/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Nested Pages WordPress plugin before 3.2.13 does not sanitise and escape some of its settings, which could allow high privilege users such as contributors to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:kylephillips:nested_pages:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.2.13",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-23T06:15Z",
    "lastModifiedDate" : "2025-04-02T14:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0719",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7184173",
          "name" : "https://www.ibm.com/support/pages/node/7184173",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak for Data 4.0.0 through 4.8.5 and 5.0.0 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_data:5.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_data:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.0",
          "versionEndIncluding" : "4.8.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-26T14:15Z",
    "lastModifiedDate" : "2025-08-08T19:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0720",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293480",
          "name" : "VDB-293480 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293480",
          "name" : "VDB-293480 | Microword eScan Antivirus Folder Watch List rtscanner removeExtraSlashes stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.482371",
          "name" : "Submit #482371 | Microword Escan Antivirus For Linux 7.0.32 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Microword eScan Antivirus 7.0.32 on Linux. It has been rated as problematic. Affected by this issue is the function removeExtraSlashes of the file /opt/MicroWorld/sbin/rtscanner of the component Folder Watch List Handler. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-26T23:15Z",
    "lastModifiedDate" : "2025-01-26T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0721",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293481",
          "name" : "VDB-293481 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293481",
          "name" : "VDB-293481 | needyamin image_gallery view.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.482812",
          "name" : "Submit #482812 | needyamin image_gallery 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html",
          "name" : "https://www.websecurityinsights.my.id/2025/01/imagegallery-viewphpusername-cross-site.html",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in needyamin image_gallery 1.0. This affects the function image_gallery of the file /view.php. The manipulation of the argument Username leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:image_gallery_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-27T00:15Z",
    "lastModifiedDate" : "2025-04-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0722",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293482",
          "name" : "VDB-293482 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293482",
          "name" : "VDB-293482 | needyamin image_gallery Cover Image gallery.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.482822",
          "name" : "Submit #482822 | needyamin image_gallery 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/01/imagegallery-add-gallery.html",
          "name" : "https://www.websecurityinsights.my.id/2025/01/imagegallery-add-gallery.html",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in needyamin image_gallery 1.0. This vulnerability affects unknown code of the file /admin/gallery.php of the component Cover Image Handler. The manipulation of the argument image leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:image_gallery_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-27T00:15Z",
    "lastModifiedDate" : "2025-02-25T20:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0723",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/includes/class-profile-magic-chat-system.php#L39",
          "name" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/includes/class-profile-magic-chat-system.php#L39",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/includes/class-profile-magic-request.php#L2379",
          "name" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/includes/class-profile-magic-request.php#L2379",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/140fa6e8-4381-4df2-af62-44d40b116daf?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/140fa6e8-4381-4df2-af62-44d40b116daf?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to blind and time-based SQL Injections via the rid and search parameters in all versions up to, and including, 5.9.4.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.9.4.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-22T05:15Z",
    "lastModifiedDate" : "2025-03-27T00:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0724",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/includes/class-profile-magic-html-generator.php#L259",
          "name" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.2/includes/class-profile-magic-html-generator.php#L259",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6bb1de69-7bc2-4785-9789-0a2d1cf35b9b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6bb1de69-7bc2-4785-9789-0a2d1cf35b9b?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.9.4.5 via deserialization of untrusted input in the get_user_meta_fields_html function. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.9.4.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-22T05:15Z",
    "lastModifiedDate" : "2025-03-27T00:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0725",
        "ASSIGNER" : "cve@curl.se"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/05/3",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/05/3",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/06/2",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/06/2",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/06/4",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/06/4",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "https://curl.se/docs/CVE-2025-0725.html",
          "name" : "www",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://curl.se/docs/CVE-2025-0725.json",
          "name" : "json",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7",
          "name" : "https://github.com/curl/curl/commit/76f83f0db23846e254d940ec7",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://hackerone.com/reports/2956023",
          "name" : "issue",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250306-0009/",
          "name" : "https://security.netapp.com/advisory/ntap-20250306-0009/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When libcurl is asked to perform automatic gzip decompression of\ncontent-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option,\n**using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would\nmake libcurl perform a buffer overflow."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:hci_baseboard_management_controller:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:hci_h610s_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:hci_h610s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:hci_h610c_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:hci_h610c:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:netapp:hci_h615c_firmware:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:netapp:hci_h615c:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:solidfire_\\&_hci_management_node:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:solidfire_\\&_hci_storage_node:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:haxx:curl:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "7.10.5",
            "versionEndExcluding" : "8.12.0",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:haxx:libcurl:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "7.10.5",
            "versionEndExcluding" : "8.12.0",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:zlib:zlib:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "1.2.0.3",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T10:15Z",
    "lastModifiedDate" : "2025-06-27T19:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0726",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014",
          "name" : "https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-pwf8-5q9w-m763",
          "name" : "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-pwf8-5q9w-m763",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before \nversion 6.4.2, an attacker can cause a denial of service by specially \ncrafted packets. The core issue is missing closing of a file in case of \nan error condition, resulting in the 404 error for each further file \nrequest. Users can work-around the issue by disabling the PUT request \nsupport."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-21T08:15Z",
    "lastModifiedDate" : "2025-07-31T16:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0727",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014",
          "name" : "https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-jf6x-9mgc-p72w",
          "name" : "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-jf6x-9mgc-p72w",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before \nversion 6.4.2, an attacker can cause an integer underflow and a \nsubsequent denial of service by writing a very large file, by specially \ncrafted packets with Content-Length in one packet smaller than the data \nrequest size of the other packet. A possible workaround is to disable \nHTTP PUT support."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-21T09:15Z",
    "lastModifiedDate" : "2025-07-31T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0728",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014",
          "name" : "https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-hqp7-4q26-6wqf",
          "name" : "https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-hqp7-4q26-6wqf",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before \nversion 6.4.2, an attacker can cause an integer underflow and a \nsubsequent denial of service by writing a very large file, by specially \ncrafted packets with Content-Length smaller than the data request size. A\n possible workaround is to disable HTTP PUT support."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-21T09:15Z",
    "lastModifiedDate" : "2025-07-31T16:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0729",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-451"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20clickjacking.md",
          "name" : "https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20clickjacking.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip",
          "name" : "https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293507",
          "name" : "VDB-293507 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293507",
          "name" : "VDB-293507 | TP-Link TL-SG108E clickjacking",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.478451",
          "name" : "Submit #478451 | tp-link TL-SG108E 1.0.0 Build 20201208 Rel.40304 Clickjacking",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.tp-link.com/",
          "name" : "https://www.tp-link.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. It has been rated as problematic. This issue affects some unknown processing. The manipulation leads to clickjacking. The attack may be initiated remotely. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-27T17:15Z",
    "lastModifiedDate" : "2025-01-27T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0730",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-598"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20sensitive%20info%20in%20GET.md",
          "name" : "https://github.com/TheCyberDiver/Public-Disclosures-CVE-/blob/main/tp-link%20sensitive%20info%20in%20GET.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip",
          "name" : "https://static.tp-link.com/upload/beta/2025/202501/20250124/TL-SG108E(UN)%206.0_1.0.0%20Build%2020250124%20Rel.54920(Beta)_up.zip",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293508",
          "name" : "VDB-293508 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293508",
          "name" : "VDB-293508 | TP-Link TL-SG108E HTTP GET Request usr_account_set.cgi get request method with sensitive query strings",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.478465",
          "name" : "Submit #478465 | tp-link TL-SG108E 1.0.0 Build 20201208 Rel.40304 Use of GET Request Method With Sensitive Query Strings",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tp-link.com/",
          "name" : "https://www.tp-link.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in TP-Link TL-SG108E 1.0.0 Build 20201208 Rel. 40304. Affected is an unknown function of the file /usr_account_set.cgi of the component HTTP GET Request Handler. The manipulation of the argument username/password leads to use of get request method with sensitive query strings. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.0 Build 20250124 Rel. 54920(Beta) is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early. They reacted very professional and provided a pre-fix version for their customers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tp-link:tl-sg108e_firmware:1.0.0:build_20201208_rel_40304:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tp-link:tl-sg108e:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-27T17:15Z",
    "lastModifiedDate" : "2025-07-16T00:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0731",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.vde.com/en/advisories/VDE-2025-012",
          "name" : "https://cert.vde.com/en/advisories/VDE-2025-012",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unauthenticated remote attacker can upload a .aspx file instead of a PV system picture through the demo account. The code can only be executed in the security context of the user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-02-26T13:15Z",
    "lastModifiedDate" : "2025-02-26T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0732",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293510",
          "name" : "VDB-293510 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293510",
          "name" : "VDB-293510 | Discord profapi.dll untrusted search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.481209",
          "name" : "Submit #481209 | Discord stable 358789 (c70705e) OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Discord up to 1.0.9177 on Windows. Affected by this issue is some unknown functionality in the library profapi.dll. The manipulation leads to untrusted search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-27T18:15Z",
    "lastModifiedDate" : "2025-01-27T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0733",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293511",
          "name" : "VDB-293511 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293511",
          "name" : "VDB-293511 | Postman profapi.dll untrusted search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.481185",
          "name" : "Submit #481185 | Postman Postman API platform v11.20 OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Postman up to 11.20 on Windows. This affects an unknown part in the library profapi.dll. The manipulation leads to untrusted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-27T18:15Z",
    "lastModifiedDate" : "2025-01-27T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0734",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          }, {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/GSBP0/3c1b0f9dbdd2a48b8f52330cfbbc279b",
          "name" : "https://gist.github.com/GSBP0/3c1b0f9dbdd2a48b8f52330cfbbc279b",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293512",
          "name" : "VDB-293512 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293512",
          "name" : "VDB-293512 | y_project RuoYi Whitelist getBeanName deserialization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.482823",
          "name" : "Submit #482823 | RuoYi <= 4.8.0 could bypass white list to RCE or Arbitrary code execution",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in y_project RuoYi up to 4.8.0 and classified as critical. This vulnerability affects the function getBeanName of the component Whitelist. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ruoyi:ruoyi:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "4.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-27T19:15Z",
    "lastModifiedDate" : "2025-05-13T20:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0736",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2663",
          "name" : "RHSA-2025:2663",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0736",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0736",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2342233",
          "name" : "RHBZ#2342233",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Infinispan, when using JGroups with JDBC_PING. This issue occurs when an application inadvertently exposes sensitive information, such as configuration details or credentials, through logging mechanisms. This exposure can lead to unauthorized access and exploitation by malicious actors."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T09:15Z",
    "lastModifiedDate" : "2025-03-12T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0739",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to show subscription's information of others users by changing the \"SUSCBRIPTION_ID\" param of the endpoint \"/demos/embedai/subscriptions/show/<SUSCBRIPTION_ID>\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T11:15Z",
    "lastModifiedDate" : "2025-01-30T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0740",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Access Control vulnerability has been found in EmbedAI\n\n 2.1 and below. This vulnerability allows an authenticated attacker to obtain chat messages belonging to other users by changing the “CHAT_ID” of the endpoint \"/embedai/chats/load_messages?chat_id=<CHAT_ID>\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T11:15Z",
    "lastModifiedDate" : "2025-01-30T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0741",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Access Control vulnerability has been found in EmbedAI\n\n 2.1 and below. This vulnerability allows an authenticated attacker to write messages into other users chat by changing the parameter \"chat_id\" of the POST request \"/embedai/chats/send_message\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T11:15Z",
    "lastModifiedDate" : "2025-02-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0742",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain files stored by others users by changing the \"FILE_ID\" of the endpoint \"/embedai/files/show/<FILE_ID>\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T12:15Z",
    "lastModifiedDate" : "2025-02-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0743",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to leverage the endpoint \"/embedai/visits/show/<VISIT_ID>\" to obtain information about the visits made by other users. The information provided by this endpoint includes IP address, userAgent and location of the user that visited the web page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T12:15Z",
    "lastModifiedDate" : "2025-02-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0744",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "an Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker change his subscription plan without paying by making a POST request changing the parameters of the \"/demos/embedai/pmt_cash_on_delivery/pay\" endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T12:15Z",
    "lastModifiedDate" : "2025-02-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0745",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Improper Access Control vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to obtain the backups of the database by requesting the \"/embedai/app/uploads/database/<SQL_FILE>\" endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T12:15Z",
    "lastModifiedDate" : "2025-02-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0746",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Reflected Cross-Site Scripting vulnerability has been found in EmbedAI 2.1 and below. This vulnerability allows an authenticated attacker to craft a malicious URL leveraging the\"/embedai/users/show/<SCRIPT>\" endpoint to inject the malicious JavaScript code. This JavaScript code will be executed when a user opens the malicious URL."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T12:15Z",
    "lastModifiedDate" : "2025-01-30T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0747",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-embedai",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Stored Cross-Site Scripting vulnerability has been found in EmbedAI. This vulnerability allows an authenticated attacker to inject a malicious JavaScript code into a message that will be executed when a user opens the chat."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T12:15Z",
    "lastModifiedDate" : "2025-02-18T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0748",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog",
          "name" : "https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a35a66c6-2a86-4f6e-b28e-d79e13489a49?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a35a66c6-2a86-4f6e-b28e-d79e13489a49?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Homey theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 2.4.3. This is due to missing or incorrect nonce validation on the 'homey_verify_user_manually' function. This makes it possible for unauthenticated attackers to update verify an user via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-07T02:15Z",
    "lastModifiedDate" : "2025-03-07T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0749",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog",
          "name" : "https://favethemes.zendesk.com/hc/en-us/articles/4407721124884-Changelog",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/05f87510-28c3-4ad1-b2be-2408a199cf68?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/05f87510-28c3-4ad1-b2be-2408a199cf68?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Homey theme for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.4.3. This is due to the 'verification_id' value being set to empty, and the not empty check is missing in the dashboard user profile page. This makes it possible for unauthenticated attackers to log in to the first verified user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-07T02:15Z",
    "lastModifiedDate" : "2025-03-07T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0750",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1122",
          "name" : "RHSA-2025:1122",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0750",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0750",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2339405",
          "name" : "RHBZ#2339405",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in CRI-O. A path traversal issue in the log management functions (UnMountPodLogs and LinkContainerLogs) may allow an attacker with permissions to create and delete Pods to unmount arbitrary host paths, leading to node-level denial of service by unmounting critical system directories."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T10:15Z",
    "lastModifiedDate" : "2025-02-11T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0751",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/axiomatic-systems/Bento4/issues/991",
          "name" : "https://github.com/axiomatic-systems/Bento4/issues/991",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/user-attachments/files/18434657/seeds.zip",
          "name" : "https://github.com/user-attachments/files/18434657/seeds.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293517",
          "name" : "VDB-293517 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293517",
          "name" : "VDB-293517 | Axiomatic Bento4 mp42aac ReadBits heap-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483315",
          "name" : "Submit #483315 | bento4.com Bento4 v1.6.0 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in Axiomatic Bento4 up to 1.6.0. This affects the function AP4_BitReader::ReadBits of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.6.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-27T20:15Z",
    "lastModifiedDate" : "2025-02-28T22:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0752",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0752",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0752",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2339115",
          "name" : "RHBZ#2339115",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in OpenShift Service Mesh 2.6.3 and 2.5.6. Rate-limiter avoidance, access-control bypass, CPU and memory exhaustion, and replay attacks may be possible due to improper HTTP header sanitization in Envoy."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_service_mesh:2.5.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:openshift_service_mesh:2.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T10:15Z",
    "lastModifiedDate" : "2025-07-31T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0753",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/axiomatic-systems/Bento4/issues/991",
          "name" : "https://github.com/axiomatic-systems/Bento4/issues/991",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/user-attachments/files/18434657/seeds.zip",
          "name" : "https://github.com/user-attachments/files/18434657/seeds.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293518",
          "name" : "VDB-293518 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293518",
          "name" : "VDB-293518 | Axiomatic Bento4 mp42aac ReadPartial heap-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483326",
          "name" : "Submit #483326 | bento Bento4 v1.6.0 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Axiomatic Bento4 up to 1.6.0. This vulnerability affects the function AP4_StdcFileByteStream::ReadPartial of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.6.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-27T21:15Z",
    "lastModifiedDate" : "2025-02-28T22:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0754",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-0754",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-0754",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2339147",
          "name" : "RHBZ#2339147",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The vulnerability was found in OpenShift Service Mesh 2.6.3 and 2.5.6. This issue occurs due to improper sanitization of HTTP headers by Envoy, particularly the x-forwarded-for header. This lack of sanitization can allow attackers to inject malicious payloads into service mesh logs, leading to log injection and spoofing attacks. Such injections can mislead logging mechanisms, enabling attackers to manipulate log entries or execute reflected cross-site scripting (XSS) attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-28T10:15Z",
    "lastModifiedDate" : "2025-01-28T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0755",
        "ASSIGNER" : "cna@mongodb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jira.mongodb.org/browse/CDRIVER-5601",
          "name" : "https://jira.mongodb.org/browse/CDRIVER-5601",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://jira.mongodb.org/browse/SERVER-94461",
          "name" : "https://jira.mongodb.org/browse/SERVER-94461",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The various bson_append functions in the MongoDB C driver library may be susceptible to buffer overflow when performing operations that could result in a final BSON document which exceeds the maximum allowable size (INT32_MAX), resulting in a segmentation fault and possible application crash. This issue affected libbson versions prior to 1.27.5, MongoDB Server v8.0 versions prior to 8.0.1 and MongoDB Server v7.0 versions prior to 7.0.16"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-18T09:15Z",
    "lastModifiedDate" : "2025-04-24T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0756",
        "ASSIGNER" : "security.vulnerabilities@hitachivantara.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756",
          "name" : "https://https://support.pentaho.com/hc/en-us/articles/35771876077709--Resolved-Hitachi-Vantara-Pentaho-Data-Integration-Analytics-Improper-Control-of-Resource-Identifiers-Resource-Injection-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0756",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Overview \n\n\n\n \n\n\n\nThe product receives input from an upstream component, but it does not restrict or incorrectly restricts the input before it is used as an identifier for a resource that may be outside the intended sphere of control. (CWE-99) \n\n\n\n \n\n\n\nDescription \n\n\n\n \n\n\n\nHitachi Vantara Pentaho Data Integration & Analytics versions before 10.2.0.2, including 9.3.x and 8.3.x, do not restrict JNDI identifiers during the creation of platform data sources. \n\n\n\n \n\n\n\nImpact \n\n\n\n \n\n\n\nAn attacker could gain access to or modify sensitive data or system resources. This could allow access to protected files or directories including configuration files and files containing sensitive information, which can lead to remote code execution by unauthorized users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T23:15Z",
    "lastModifiedDate" : "2025-04-17T20:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0757",
        "ASSIGNER" : "security.vulnerabilities@hitachivantara.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.pentaho.com/hc/en-us/articles/35781038882445--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0757",
          "name" : "https://support.pentaho.com/hc/en-us/articles/35781038882445--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Improper-Neutralization-of-Input-During-Web-Page-Generation-Cross-site-Scripting-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0757",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Overview\n\n\n\n \n\n\n\nThe software does not neutralize or incorrectly neutralize user-controllable input before it is placed in output that is used as a web page that is served to other users. (CWE-79) \n\n\n\n \n\n\n\nDescription \n\n\n\n \n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, allow a malicious URL to inject content into the Analyzer plugin interface. \n\n\n\n \n\n\n\nImpact \n\n\n\n \n\n\n\nOnce the malicious script is injected, the attacker can perform a variety of malicious activities. The attacker could transfer private information, such as cookies that may include session information, from the victim's machine to the attacker. The attacker could send malicious requests to a web site on behalf of the victim, which could be especially dangerous to the site if the victim has administrator privileges to manage that site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T23:15Z",
    "lastModifiedDate" : "2025-04-17T20:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0758",
        "ASSIGNER" : "security.vulnerabilities@hitachivantara.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.pentaho.com/hc/en-us/articles/35781318194061--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Permission-Assignment-for-Critical-Resource-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0758",
          "name" : "https://support.pentaho.com/hc/en-us/articles/35781318194061--Resolved-Hitachi-Vantara-Pentaho-Business-Analytics-Server-Incorrect-Permission-Assignment-for-Critical-Resource-Versions-before-10-2-0-2-including-9-3-x-Impacted-CVE-2025-0758",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Overview \n\n\n\nThe product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors. (CWE-732) \n\n\n\nDescription \n\n\n\nHitachi Vantara Pentaho Business Analytics Server prior to versions 10.2.0.2, including 9.3.x and 8.3.x, is installed with Karaf JMX beans enabled and accessible by default. \n\n\n\nImpact \n\n\n\nWhen the vulnerability is leveraged, a user with local execution privileges can access functionality exposed by Karaf beans contained in the product."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T23:15Z",
    "lastModifiedDate" : "2025-04-17T20:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0759",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7184194",
          "name" : "https://www.ibm.com/support/pages/node/7184194",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM EntireX 11.1 could allow a local user to unintentionally modify data timestamp integrity due to improper shared resource synchronization."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:entirex:11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-27T15:15Z",
    "lastModifiedDate" : "2025-07-08T20:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0760",
        "ASSIGNER" : "vulnreport@tenable.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.tenable.com/security/tns-2025-01",
          "name" : "https://www.tenable.com/security/tns-2025-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Credential Disclosure vulnerability exists where an administrator could extract the stored SMTP account credentials due to lack of encryption."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T00:15Z",
    "lastModifiedDate" : "2025-02-26T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0762",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html",
          "name" : "https://chromereleases.googleblog.com/2025/01/stable-channel-update-for-desktop_28.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/384844003",
          "name" : "https://issues.chromium.org/issues/384844003",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "132.0.6834.159",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-29T11:15Z",
    "lastModifiedDate" : "2025-04-21T20:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0764",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3245711/wpforo",
          "name" : "https://plugins.trac.wordpress.org/changeset/3245711/wpforo",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cd8ffcb-0a24-4e0a-a9f9-23501742715f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8cd8ffcb-0a24-4e0a-a9f9-23501742715f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The wpForo Forum plugin for WordPress is vulnerable to arbitrary file read due to insufficient input validation in the 'update' method of the 'Members' class in all versions up to, and including, 2.4.1. This makes it possible for authenticated attackers, with subscriber-level privileges or higher, to read arbitrary files on the server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gvectors:wpforo_forum:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-28T07:15Z",
    "lastModifiedDate" : "2025-03-06T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0765",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/515381",
          "name" : "GitLab Issue #515381",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2956315",
          "name" : "HackerOne Bug Bounty Report #2956315",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.9 before 18.0.5, 18.1 before 18.1.3, and 18.2 before 18.2.1 that could have allowed an unauthorized user to access custom service desk email addresses."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.2:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.2:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "18.0.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "18.0.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-24T07:15Z",
    "lastModifiedDate" : "2025-08-08T18:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0767",
        "ASSIGNER" : "help@fluidattacks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://co.wordpress.org/plugins/wp-security-audit-log/",
          "name" : "https://co.wordpress.org/plugins/wp-security-audit-log/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://fluidattacks.com/advisories/skims-9/",
          "name" : "https://fluidattacks.com/advisories/skims-9/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WP Activity Log 5.3.2 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/classes/Writers/class-csv-writer.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:melapress:wp_activity_log:5.3.2:*:*:*:*:wordpress:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-27T19:15Z",
    "lastModifiedDate" : "2025-05-21T17:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0769",
        "ASSIGNER" : "help@fluidattacks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://co.wordpress.org/plugins/pixelyoursite/#developers",
          "name" : "https://co.wordpress.org/plugins/pixelyoursite/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://fluidattacks.com/advisories/skims-23/",
          "name" : "https://fluidattacks.com/advisories/skims-23/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PixelYourSite - Your smart PIXEL (TAG) and API Manager 10.1.1.1 was found to be vulnerable. Unvalidated user input is used directly in an unserialize function in myapp/modules/facebook/facebook-server-a sync-task.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T20:15Z",
    "lastModifiedDate" : "2025-02-28T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0781",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358",
          "name" : "https://gitlab.com/flightgear/flightgear/-/commit/ad37afce28083fad7f79467b3ffdead753584358",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://gitlab.com/flightgear/flightgear/-/issues/3025",
          "name" : "GitLab Issue #3025",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8",
          "name" : "https://gitlab.com/flightgear/simgear/-/commit/5bb023647114267141a7610e8f1ca7d6f4f5a5a8",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/01/msg00028.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/01/msg00028.html",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        }, {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/01/msg00029.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/01/msg00029.html",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker can bypass the sandboxing of Nasal scripts and arbitrarily write to any file path that the user has permission to modify at the operating-system level."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:flightgear:simgear:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2020.3.19",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.9,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-01-28T17:15Z",
    "lastModifiedDate" : "2025-08-06T19:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0782",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-02T21:15Z",
    "lastModifiedDate" : "2025-05-20T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0783",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.google.com/document/d/1FCJveTlXtJd8EJRW2-LXwuhno92JaVt3_98Iqrdoc6M/edit?tab=t.0#heading=h.bbpri264qnth",
          "name" : "https://docs.google.com/document/d/1FCJveTlXtJd8EJRW2-LXwuhno92JaVt3_98Iqrdoc6M/edit?tab=t.0#heading=h.bbpri264qnth",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/1KqzS5bMyPtgO9eIk_-que50tZU097RVi/view",
          "name" : "https://drive.google.com/file/d/1KqzS5bMyPtgO9eIk_-que50tZU097RVi/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293907",
          "name" : "VDB-293907 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293907",
          "name" : "VDB-293907 | pankajindevops scale API Endpoint access control",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.480350",
          "name" : "Submit #480350 | Scale@ https://github.com/pankajindevops/scale Project Management System latest  Improper Access Controls",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in pankajindevops scale up to 20241113. This affects an unknown part of the component API Endpoint. The manipulation leads to improper access controls. It is possible to initiate the attack remotely. This product does not use versioning. This is why information about affected and unaffected releases are unavailable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-28T19:15Z",
    "lastModifiedDate" : "2025-01-28T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0784",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-310"
          }, {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Password-exposed-in-clear-text-17d27474cccb806fba1efda195c78258?pvs=4",
          "name" : "https://eldruin.notion.site/Intelbras-InControl-v2-21-57-Password-exposed-in-clear-text-17d27474cccb806fba1efda195c78258?pvs=4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293908",
          "name" : "VDB-293908 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293908",
          "name" : "VDB-293908 | Intelbras InControl Registered User usuario cleartext transmission",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.483835",
          "name" : "Submit #483835 | Intelbras InControl 2.21.57 Cleartext Transmission of Sensitive Information",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Intelbras InControl up to 2.21.58 and classified as problematic. This vulnerability affects unknown code of the file /v1/usuario/ of the component Registered User Handler. The manipulation leads to cleartext transmission of sensitive information. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.21.59 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-28T20:15Z",
    "lastModifiedDate" : "2025-01-28T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0785",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/SysConfig.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/SysConfig.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293909",
          "name" : "VDB-293909 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293909",
          "name" : "VDB-293909 | ESAFENET CDG SysConfig.jsp cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483338",
          "name" : "Submit #483338 | esafenet CDG V5 Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG V5 and classified as problematic. This issue affects some unknown processing of the file /SysConfig.jsp. The manipulation of the argument help leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-28T22:15Z",
    "lastModifiedDate" : "2025-05-16T15:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0786",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293910",
          "name" : "VDB-293910 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293910",
          "name" : "VDB-293910 | ESAFENET CDG appDetail.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483339",
          "name" : "Submit #483339 | esafenet CDG V5 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG V5. It has been classified as critical. Affected is an unknown function of the file /appDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-28T22:15Z",
    "lastModifiedDate" : "2025-05-16T15:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0787",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail_1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail_1.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail_1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/appDetail_1.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293911",
          "name" : "VDB-293911 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293911",
          "name" : "VDB-293911 | ESAFENET CDG appDetail.jsp cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483340",
          "name" : "Submit #483340 | esafenet CDG V5 Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG V5. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /appDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-28T22:15Z",
    "lastModifiedDate" : "2025-05-16T15:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0788",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/content_top.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/content_top.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/content_top.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/content_top.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293912",
          "name" : "VDB-293912 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293912",
          "name" : "VDB-293912 | ESAFENET CDG content_top.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483341",
          "name" : "Submit #483341 | esafenet CDG V5 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG V5. It has been rated as critical. Affected by this issue is some unknown functionality of the file /content_top.jsp. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-28T23:15Z",
    "lastModifiedDate" : "2025-05-16T15:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0789",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293913",
          "name" : "VDB-293913 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293913",
          "name" : "VDB-293913 | ESAFENET CDG doneDetail.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483342",
          "name" : "Submit #483342 | esafenet CDG V5 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in ESAFENET CDG V5. This affects an unknown part of the file /doneDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-28T23:15Z",
    "lastModifiedDate" : "2025-05-23T14:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0790",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail_1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail_1.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail_1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/doneDetail_1.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293914",
          "name" : "VDB-293914 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293914",
          "name" : "VDB-293914 | ESAFENET CDG doneDetail.jsp cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483343",
          "name" : "Submit #483343 | esafenet CDG V5 Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in ESAFENET CDG V5. This vulnerability affects unknown code of the file /doneDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T00:15Z",
    "lastModifiedDate" : "2025-05-23T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0791",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/sdDoneDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/sdDoneDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/sdDoneDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/sdDoneDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293915",
          "name" : "VDB-293915 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293915",
          "name" : "VDB-293915 | ESAFENET CDG sdDoneDetail.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483344",
          "name" : "Submit #483344 | esafenet CDG V5 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in ESAFENET CDG V5. This issue affects some unknown processing of the file /sdDoneDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T00:15Z",
    "lastModifiedDate" : "2025-05-23T14:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0792",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/sdTodoDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/sdTodoDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/sdTodoDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/sdTodoDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293916",
          "name" : "VDB-293916 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293916",
          "name" : "VDB-293916 | ESAFENET CDG sdTodoDetail.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483345",
          "name" : "Submit #483345 | esafenet CDG V5 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in ESAFENET CDG V5. Affected is an unknown function of the file /sdTodoDetail.jsp. The manipulation of the argument flowId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T00:15Z",
    "lastModifiedDate" : "2025-05-23T14:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0793",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/todoDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/todoDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/todoDetail.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/todoDetail.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293917",
          "name" : "VDB-293917 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293917",
          "name" : "VDB-293917 | ESAFENET CDG todoDetail.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483346",
          "name" : "Submit #483346 | esafenet CDG V5 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in ESAFENET CDG V5 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /todoDetail.jsp. The manipulation of the argument flowId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T01:15Z",
    "lastModifiedDate" : "2025-05-13T21:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0794",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/todoDetail_1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/todoDetail_1.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293918",
          "name" : "VDB-293918 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293918",
          "name" : "VDB-293918 | ESAFENET CDG todoDetail.jsp cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483347",
          "name" : "Submit #483347 | esafenet CDG V5 Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG V5 and classified as problematic. Affected by this issue is some unknown functionality of the file /todoDetail.jsp. The manipulation of the argument curpage leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T01:15Z",
    "lastModifiedDate" : "2025-05-13T21:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0795",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/todolistjump.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/todolistjump.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293919",
          "name" : "VDB-293919 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293919",
          "name" : "VDB-293919 | ESAFENET CDG todolistjump.jsp cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.483349",
          "name" : "Submit #483349 | esafenet CDG V5 Cross-Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG V5. It has been classified as problematic. This affects an unknown part of the file /todolistjump.jsp. The manipulation of the argument flowId leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T02:15Z",
    "lastModifiedDate" : "2025-05-13T21:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0796",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/wprequal/",
          "name" : "https://wordpress.org/plugins/wprequal/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/316b807c-06ca-4448-acb9-80766a07258a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/316b807c-06ca-4448-acb9-80766a07258a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Mortgage Lead Capture System plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 8.2.10. This is due to missing or incorrect nonce validation on the 'wprequal_reset_defaults' action. This makes it possible for unauthenticated attackers to reset the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:kevinbrent:wprequal:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "8.2.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-18T05:15Z",
    "lastModifiedDate" : "2025-02-21T15:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0797",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-266"
          }, {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_incorrect_default_perms_leads_to_malware_evasion.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_incorrect_default_perms_leads_to_malware_evasion.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293920",
          "name" : "VDB-293920 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293920",
          "name" : "VDB-293920 | MicroWorld eScan Antivirus Quarantine Microworld default permission",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.484329",
          "name" : "Submit #484329 | MicroWorld Escan Antivirus on Linux 7.0.32 Incorrect Default Permissions",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects unknown code of the file /var/Microworld/ of the component Quarantine Handler. The manipulation leads to incorrect default permissions. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-29T02:15Z",
    "lastModifiedDate" : "2025-01-29T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0798",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_rtscanner_rce.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_rtscanner_rce.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293921",
          "name" : "VDB-293921 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293921",
          "name" : "VDB-293921 | MicroWorld eScan Antivirus Quarantine rtscanner os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.484718",
          "name" : "Submit #484718 | Microword Escan Antivirus For Linux 7.0.32 OS Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in MicroWorld eScan Antivirus 7.0.32 on Linux. It has been rated as critical. This issue affects some unknown processing of the file rtscanner of the component Quarantine Handler. The manipulation leads to os command injection. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T02:15Z",
    "lastModifiedDate" : "2025-01-29T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0799",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7182418",
          "name" : "https://www.ibm.com/support/pages/node/7182418",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM App Connect enterprise 12.0.1.0 through 12.0.12.10 and 13.0.1.0 through 13.0.2.1 could allow an authenticated user to write to an arbitrary file on the system during bar configuration deployment due to improper pathname limitations on restricted directories."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "12.0.1.0",
          "versionEndIncluding" : "12.0.12.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "13.0.1.0",
          "versionEndIncluding" : "13.0.2.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T01:15Z",
    "lastModifiedDate" : "2025-08-12T18:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0800",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293922",
          "name" : "VDB-293922 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293922",
          "name" : "VDB-293922 | SourceCodester Online Courseware Edit Teacher saveeditt.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.484935",
          "name" : "Submit #484935 | Sourcecodester Online Courseware 1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in SourceCodester Online Courseware 1.0. Affected is an unknown function of the file /pcci/admin/saveeditt.php of the component Edit Teacher. The manipulation of the argument fname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:argie:online_courseware:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T02:15Z",
    "lastModifiedDate" : "2025-02-10T14:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0801",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244718%40ratemyagent-official&new=3244718%40ratemyagent-official&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/ratemyagent-official/",
          "name" : "https://wordpress.org/plugins/ratemyagent-official/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b559017c-f1d2-4f18-bfb6-e52f05910e34?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b559017c-f1d2-4f18-bfb6-e52f05910e34?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The RateMyAgent Official plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.4.0. This is due to missing or incorrect nonce validation on the 'rma-settings-wizard'. This makes it possible for unauthenticated attackers to update the plugin's API key via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ratemyagent:ratemyagent:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.5.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-28T05:15Z",
    "lastModifiedDate" : "2025-03-06T20:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0802",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/theanm0l/VulnDB/blob/main/Improper%20Authorization.md",
          "name" : "https://github.com/theanm0l/VulnDB/blob/main/Improper%20Authorization.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293923",
          "name" : "VDB-293923 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293923",
          "name" : "VDB-293923 | SourceCodester Best Employee Management System Administrative Endpoint View_user.php access control",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485005",
          "name" : "Submit #485005 | Sourcecodester Best employee management system NA Improper Privilege Management",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in SourceCodester Best Employee Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/View_user.php of the component Administrative Endpoint. The manipulation leads to improper access controls. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-01-29T02:15Z",
    "lastModifiedDate" : "2025-02-10T14:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0803",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/alc9700jmo/CVE/issues/8",
          "name" : "https://github.com/alc9700jmo/CVE/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293924",
          "name" : "VDB-293924 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.293924",
          "name" : "VDB-293924 | Codezips Gym Management System submit_plan_new.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.485218",
          "name" : "Submit #485218 | Codezips Gym Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/submit_plan_new.php. The manipulation of the argument planid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gymmanagementsystem:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T02:15Z",
    "lastModifiedDate" : "2025-02-11T19:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0804",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3219341/clickwhale/tags/2.4.2/includes/admin/links/Clickwhale_Links_List_Table.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3219341/clickwhale/tags/2.4.2/includes/admin/links/Clickwhale_Links_List_Table.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf41b5e1-610e-4159-9325-f7a694380050?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bf41b5e1-610e-4159-9325-f7a694380050?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ClickWhale – Link Manager, Link Shortener and Click Tracker for Affiliate Links & Link Pages plugin for WordPress is vulnerable to Stored Cross-Site Scripting via link titles in all versions up to, and including, 2.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:flowdee:clickwhale:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T04:15Z",
    "lastModifiedDate" : "2025-05-23T15:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0805",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/mortgage-loan-calculator/tags/1.5.20/en/forms.inc.php",
          "name" : "https://plugins.trac.wordpress.org/browser/mortgage-loan-calculator/tags/1.5.20/en/forms.inc.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/mortgage-loan-calculator/tags/1.5.20/mlcalc.php#L62",
          "name" : "https://plugins.trac.wordpress.org/browser/mortgage-loan-calculator/tags/1.5.20/mlcalc.php#L62",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a8ca426-34cd-4c98-ae24-f3f31a7fcae5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a8ca426-34cd-4c98-ae24-f3f31a7fcae5?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Mortgage Calculator / Loan Calculator plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'mlcalc' shortcode in all versions up to, and including, 1.5.20 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mlcalc:mortgage_loan_calculator:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.5.20",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-18T05:15Z",
    "lastModifiedDate" : "2025-02-21T15:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0806",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1337g/CVE-2025-X/blob/main/xss-1_27.md",
          "name" : "https://github.com/1337g/CVE-2025-X/blob/main/xss-1_27.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293903",
          "name" : "VDB-293903 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.293903",
          "name" : "VDB-293903 | code-projects Job Recruitment _call_job_search_ajax.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.490056",
          "name" : "Submit #490056 | code-projects job-recruitment v1.0 php Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Job Recruitment 1.0. It has been rated as problematic. This issue affects some unknown processing of the file _call_job_search_ajax.php. The manipulation of the argument job_type leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-29T03:15Z",
    "lastModifiedDate" : "2025-02-11T19:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0807",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/cits-support-svg-webp-media-upload/trunk/includes/cits-custom-fonts.php",
          "name" : "https://plugins.trac.wordpress.org/browser/cits-support-svg-webp-media-upload/trunk/includes/cits-custom-fonts.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3772ddad-4960-48c8-904e-2457d12bd01c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3772ddad-4960-48c8-904e-2457d12bd01c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The CITS Support svg, webp Media and TTF,OTF File Upload, Use Custom Fonts plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2. This is due to missing or incorrect nonce validation on the cits_settings_tab() function. This makes it possible for unauthenticated attackers to update the plugin's settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-22T07:15Z",
    "lastModifiedDate" : "2025-03-22T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0808",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3235031/houzez-property-feed/trunk/includes/class-houzez-property-feed-export.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3235031/houzez-property-feed/trunk/includes/class-houzez-property-feed-export.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd866ac-6094-4f76-9fba-69494381214c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6fd866ac-6094-4f76-9fba-69494381214c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Houzez Property Feed plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.4.21. This is due to missing or incorrect nonce validation on the \"deleteexport\" action. This makes it possible for unauthenticated attackers to delete property feed exports via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wp-property-hive:houzez_property_feed:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.4.22",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-02-12T04:15Z",
    "lastModifiedDate" : "2025-02-25T03:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0809",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/permalink-finder/",
          "name" : "https://wordpress.org/plugins/permalink-finder/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/37198f2f-2b45-40d3-b4ae-aa94213996bd?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/37198f2f-2b45-40d3-b4ae-aa94213996bd?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Link Fixer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via broken links in all versions up to, and including, 3.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-31T06:15Z",
    "lastModifiedDate" : "2025-01-31T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0810",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMoreInit.php#L122",
          "name" : "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMoreInit.php#L122",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L59",
          "name" : "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L59",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L82",
          "name" : "https://plugins.trac.wordpress.org/browser/expand-maker/trunk/classes/ReadMorePages.php#L82",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a963cd9b-9f8f-4bd2-92cd-74c5e85e1d96?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a963cd9b-9f8f-4bd2-92cd-74c5e85e1d96?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Read More & Accordion plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.4.5. This is due to missing or incorrect nonce validation on the addNewButtons() function. This makes it possible for unauthenticated attackers to include and execute arbitrary PHP files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-05T02:15Z",
    "lastModifiedDate" : "2025-04-05T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0811",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/515566",
          "name" : "GitLab Issue #515566",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/2961854",
          "name" : "HackerOne Bug Bounty Report #2961854",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.7 before 17.8.6, 17.9 before 17.9.3, and 17.10 before 17.10.1. Improper rendering of certain file types leads to cross-site scripting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.10.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.8.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.8.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.10.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-27T13:15Z",
    "lastModifiedDate" : "2025-08-13T01:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0813",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-02.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-02&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-02.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-287: Improper Authentication vulnerability exists that could cause an Authentication Bypass when an\nunauthorized user without permission rights has physical access to the EPAS-UI computer and is able to\nreboot the workstation and interrupt the normal boot process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-03-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0814",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-04.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-04.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the network\nservices running on the product when malicious IEC61850-MMS packets are sent to the device. The core\nfunctionality of the breaker remains intact during the attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T07:15Z",
    "lastModifiedDate" : "2025-02-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0815",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-04.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-04.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the\nproduct when malicious ICMPV6 packets are sent to the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T07:15Z",
    "lastModifiedDate" : "2025-02-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0816",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-04.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-042-04&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-04.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-20: Improper Input Validation vulnerability exists that could cause Denial-of-Service of the\nproduct when malicious IPV6 packets are sent to the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T07:15Z",
    "lastModifiedDate" : "2025-02-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0817",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/formcraft-premium-wordpress-form-builder/5335056",
          "name" : "https://codecanyon.net/item/formcraft-premium-wordpress-form-builder/5335056",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://formcraft-wp.com/changelog/",
          "name" : "https://formcraft-wp.com/changelog/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae0710a-8c9b-41b0-860f-ae79b7ed1ee4?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7ae0710a-8c9b-41b0-860f-ae79b7ed1ee4?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The FormCraft plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 3.9.11 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ncrafts:formcraft:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.9.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-18T11:15Z",
    "lastModifiedDate" : "2025-02-21T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0818",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Studio-42/elFinder",
          "name" : "https://github.com/Studio-42/elFinder",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Studio-42/elFinder/blob/master/php/elFinder.class.php#L5367",
          "name" : "https://github.com/Studio-42/elFinder/blob/master/php/elFinder.class.php#L5367",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/library/php/elFinder.class.php#L5411",
          "name" : "https://plugins.trac.wordpress.org/browser/file-manager-advanced/trunk/application/library/php/elFinder.class.php#L5411",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/lib/php/elFinder.class.php#L5378",
          "name" : "https://plugins.trac.wordpress.org/browser/filester/trunk/includes/File_manager/lib/php/elFinder.class.php#L5378",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/lib/php/elFinder.class.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-file-manager/trunk/lib/php/elFinder.class.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3319016/filester",
          "name" : "https://plugins.trac.wordpress.org/changeset/3319016/filester",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3335715/file-manager-advanced/trunk/application/library/php/elFinder.class.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3335715/file-manager-advanced/trunk/application/library/php/elFinder.class.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a166de-3bdf-4883-91ba-655f2757c53b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2a166de-3bdf-4883-91ba-655f2757c53b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Several WordPress plugins using elFinder versions 2.1.64 and prior are vulnerable to Directory Traversal in various versions. This makes it possible for unauthenticated attackers to delete arbitrary files. Successful exploitation of this vulnerability requires a site owner to explicitly make an instance of the file manager available to users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-08-13T04:16Z",
    "lastModifiedDate" : "2025-08-13T04:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0819",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110466/latest/",
          "name" : "https://developer.arm.com/documentation/110466/latest/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Arm Ltd Bifrost GPU Kernel Driver, Arm Ltd Valhall GPU Kernel Driver, Arm Ltd Arm 5th Gen GPU Architecture Kernel Driver allows a local non-privileged user process to perform valid GPU memory processing operations to gain access to already freed memory.This issue affects Bifrost GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r51p0; Valhall GPU Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Kernel Driver: from r44p0 through r49p3, from r50p0 through r54p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r44p0",
          "versionEndExcluding" : "r49p4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndExcluding" : "r54p1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r44p0",
          "versionEndExcluding" : "r49p4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r50p0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_kernel_driver:r51p0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r44p0",
          "versionEndExcluding" : "r49p4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_kernel_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndExcluding" : "r54p1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T11:15Z",
    "lastModifiedDate" : "2025-07-02T21:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0820",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/clicface-trombi/trunk/clicface-trombi.php#L80",
          "name" : "https://plugins.trac.wordpress.org/browser/clicface-trombi/trunk/clicface-trombi.php#L80",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/clicface-trombi/#developers",
          "name" : "https://wordpress.org/plugins/clicface-trombi/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9ff834-8a11-4ec7-9371-15d56bc84106?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9ff834-8a11-4ec7-9371-15d56bc84106?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Clicface Trombi plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘nom’ parameter in all versions up to, and including, 2.08 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-01T05:15Z",
    "lastModifiedDate" : "2025-03-01T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0821",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/bit-assist/tags/1.5.2/backend/app/HTTP/Controllers/WidgetChannelController.php#L89",
          "name" : "https://plugins.trac.wordpress.org/browser/bit-assist/tags/1.5.2/backend/app/HTTP/Controllers/WidgetChannelController.php#L89",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3239816/#file5",
          "name" : "https://plugins.trac.wordpress.org/changeset/3239816/#file5",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/bit-assist/#developers",
          "name" : "https://wordpress.org/plugins/bit-assist/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b64fc9d8-ea02-49e7-add1-8d83f0f41431?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b64fc9d8-ea02-49e7-add1-8d83f0f41431?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Bit Assist plugin for WordPress is vulnerable to time-based SQL Injection via the ‘id’ parameter in all versions up to, and including, 1.5.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitapps:bit_assist:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.5.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-14T11:15Z",
    "lastModifiedDate" : "2025-02-25T03:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0822",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/bit-assist/tags/1.5.2/backend/app/HTTP/Controllers/DownloadController.php#L65",
          "name" : "https://plugins.trac.wordpress.org/browser/bit-assist/tags/1.5.2/backend/app/HTTP/Controllers/DownloadController.php#L65",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3239816/#file3",
          "name" : "https://plugins.trac.wordpress.org/changeset/3239816/#file3",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/bit-assist/#developers",
          "name" : "https://wordpress.org/plugins/bit-assist/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/de9b0eba-5d2b-427c-a199-88bf96c26f5e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/de9b0eba-5d2b-427c-a199-88bf96c26f5e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Bit Assist plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.5.2 via the fileID Parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitapps:bit_assist:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.5.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-15T13:15Z",
    "lastModifiedDate" : "2025-02-24T12:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0823",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7183676",
          "name" : "https://www.ibm.com/support/pages/node/7183676",
          "refsource" : "",
          "tags" : [ "Patch", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cognos Analytics 11.2.0 through 11.2.4 FP5 and 12.0.0 through 12.0.4 could allow a remote attacker to traverse directories on the system. An attacker could send a specially crafted URL request containing \"dot dot\" sequences (/../) to view arbitrary files on the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.2.0",
          "versionEndExcluding" : "11.2.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndExcluding" : "12.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:12.0.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:12.0.4:interim_fix_1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-28T03:15Z",
    "lastModifiedDate" : "2025-07-02T15:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0825",
        "ASSIGNER" : "oss-report@checkmarx.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://advisory.checkmarx.net/advisory/CVE-2025-0825/",
          "name" : "https://advisory.checkmarx.net/advisory/CVE-2025-0825/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289",
          "name" : "https://github.com/yhirose/cpp-httplib/commit/9c36aae4b73e2b6e493f4133e4173103c9266289",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "cpp-httplib version v0.17.3 through v0.18.3 fails to filter CRLF characters (\"\\r\\n\") when those are prefixed with a null byte. This enables attackers to exploit CRLF injection that could further lead to HTTP Response Splitting, XSS, and more."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yhirose:cpp-httplib:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.17.3",
          "versionEndExcluding" : "0.18.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-04T15:15Z",
    "lastModifiedDate" : "2025-08-04T15:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0826",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting 3D Navigate in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0827",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting 3DPlay in 3DSwymer from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0828",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Engineering Release in ENOVIA Product Engineering Specialist from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0829",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting 3D Markup in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0830",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Meeting Management in ENOVIA Change Manager from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0831",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/trust-center/security/security-advisories/cve-2025-0831",
          "name" : "https://www.3ds.com/trust-center/security/security-advisories/cve-2025-0831",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-Of-Bounds Read vulnerability exists in the JT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted JT file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-15T15:15Z",
    "lastModifiedDate" : "2025-07-15T20:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0832",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Project Gantt in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2022x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0833",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stored Cross-site Scripting (XSS) vulnerability affecting Route Management in ENOVIA Collaborative Industry Innovator from Release 3DEXPERIENCE R2023x through Release 3DEXPERIENCE R2024x allows an attacker to execute arbitrary script code in user's browser session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T14:15Z",
    "lastModifiedDate" : "2025-03-17T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0834",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/wondershare-drfone-privilege-scalation-vulnerability",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/wondershare-drfone-privilege-scalation-vulnerability",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Privilege escalation vulnerability has been found in Wondershare Dr.Fone version 13.5.21. This vulnerability could allow an attacker to escalate privileges by replacing the binary ‘C:\\ProgramData\\Wondershare\\wsServices\\ElevationService.exe’ with a malicious binary. This binary will be executed by SYSTEM automatically."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T09:15Z",
    "lastModifiedDate" : "2025-01-30T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0835",
        "ASSIGNER" : "security@imgtec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "name" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Software installed and run as a non-privileged user may conduct improper GPU system calls to corrupt kernel heap memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-24T12:15Z",
    "lastModifiedDate" : "2025-03-24T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0837",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/puzzles-wordpress-magazinereview-with-wooc/5690583",
          "name" : "https://themeforest.net/item/puzzles-wordpress-magazinereview-with-wooc/5690583",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/669e3015-b64c-440d-bc06-db4828c07196?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/669e3015-b64c-440d-bc06-db4828c07196?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Puzzles theme for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 4.2.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themerex:puzzles:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "4.2.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-13T05:15Z",
    "lastModifiedDate" : "2025-02-24T17:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0838",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1",
          "name" : "https://github.com/abseil/abseil-cpp/commit/5a0e2cb5e3958dd90bb8569a2766622cb74d90c1",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/04/msg00012.html",
          "refsource" : "",
          "tags" : [ "Mailing List", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:abseil:common_libraries:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "20250127.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-21T15:15Z",
    "lastModifiedDate" : "2025-07-30T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0839",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433",
          "name" : "https://codecanyon.net/item/zoomsounds-wordpress-wave-audio-player-with-playlist/6181433",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/49b76f5f-03f7-48bc-b848-9ab55d875639?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/49b76f5f-03f7-48bc-b848-9ab55d875639?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ZoomSounds plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 6.91 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:digitalzoomstudio:zoomsounds:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "6.91",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-05T06:15Z",
    "lastModifiedDate" : "2025-06-04T22:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0840",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15882",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15882",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32560",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32560",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893",
          "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=baac6c221e9d69335bf41366a1c7d87d8ab2f893",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293997",
          "name" : "VDB-293997 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293997",
          "name" : "VDB-293997 | GNU Binutils objdump.c disassemble_bytes stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485255",
          "name" : "Submit #485255 | GNU binutils/objdump 2.43 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in GNU Binutils up to 2.43. This affects the function disassemble_bytes of the file binutils/objdump.c. The manipulation of the argument buf leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. The identifier of the patch is baac6c221e9d69335bf41366a1c7d87d8ab2f893. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.44",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T20:15Z",
    "lastModifiedDate" : "2025-03-04T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0841",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/52383f40d11becb79ce4033cb46546eb",
          "name" : "https://gist.github.com/mcdruid/52383f40d11becb79ce4033cb46546eb",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.293998",
          "name" : "VDB-293998 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.293998",
          "name" : "VDB-293998 | Aridius XYZ News loadMore deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.485445",
          "name" : "Submit #485445 | Aridius OpenCart modules ? Deserialization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Aridius XYZ up to 20240927 on OpenCart and classified as critical. This vulnerability affects the function loadMore of the component News. The manipulation leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-01-29T21:15Z",
    "lastModifiedDate" : "2025-01-29T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0842",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.293999",
          "name" : "VDB-293999 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.293999",
          "name" : "VDB-293999 | needyamin Library Card System Login admin.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485540",
          "name" : "Submit #485540 | needyamin Library-Card-System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1",
          "name" : "https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in needyamin Library Card System 1.0 and classified as critical. This issue affects some unknown processing of the file admin.php of the component Login. The manipulation of the argument email/password leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:library_card_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T22:15Z",
    "lastModifiedDate" : "2025-02-25T19:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0843",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294000",
          "name" : "VDB-294000 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294000",
          "name" : "VDB-294000 | needyamin Library Card System Admin Panel admindashboard.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485553",
          "name" : "Submit #485553 | Needyamin Library-Card-System 1.0 Broken Access Control",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1",
          "name" : "https://www.websecurityinsights.my.id/2025/01/library-card-system-admin-login-bypass.html?m=1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in needyamin Library Card System 1.0. It has been classified as critical. Affected is an unknown function of the file admindashboard.php of the component Admin Panel. The manipulation of the argument email/password leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:library_card_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-29T23:15Z",
    "lastModifiedDate" : "2025-02-04T17:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0844",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294001",
          "name" : "VDB-294001 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294001",
          "name" : "VDB-294001 | needyamin Library Card System Registration Page signup.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485558",
          "name" : "Submit #485558 | Needyamin Library-Card-System 1.0 Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/01/library-card-system-stored-cross-site.html?m=1",
          "name" : "https://www.websecurityinsights.my.id/2025/01/library-card-system-stored-cross-site.html?m=1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in needyamin Library Card System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file signup.php of the component Registration Page. The manipulation of the argument firstname/lastname/email/borrow/user_address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:library_card_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-30T00:15Z",
    "lastModifiedDate" : "2025-02-04T17:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0845",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/lms-learning-management-system-education-lms-wordpress-theme/7867581",
          "name" : "https://themeforest.net/item/lms-learning-management-system-education-lms-wordpress-theme/7867581",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/39ea4627-66b2-42a6-913e-04c708491b8d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/39ea4627-66b2-42a6-913e-04c708491b8d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The DesignThemes Core Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via shortcodes in versions up to, and including, 4.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-25T06:15Z",
    "lastModifiedDate" : "2025-03-25T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0846",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/onupset/CVE/issues/4",
          "name" : "https://github.com/onupset/CVE/issues/4",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294009",
          "name" : "VDB-294009 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294009",
          "name" : "VDB-294009 | 1000 Projects Employee Task Management System AdminLogin.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485756",
          "name" : "Submit #485756 | 1000 Projects Employee Task Management System Web Project using PHP and MYSQL 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/AdminLogin.php. The manipulation of the argument email leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T01:15Z",
    "lastModifiedDate" : "2025-02-04T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0847",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/onupset/CVE/issues/5",
          "name" : "https://github.com/onupset/CVE/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294010",
          "name" : "VDB-294010 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294010",
          "name" : "VDB-294010 | 1000 Projects Employee Task Management System Login index.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485762",
          "name" : "Submit #485762 | 1000 Projects Employee Task Management System Web Project using PHP and MYSQL 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in 1000 Projects Employee Task Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /index.php of the component Login. The manipulation of the argument email leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:employee_task_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T02:15Z",
    "lastModifiedDate" : "2025-02-04T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0848",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/alc9700jmo/CVE/issues/9",
          "name" : "https://github.com/alc9700jmo/CVE/issues/9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294011",
          "name" : "VDB-294011 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294011",
          "name" : "VDB-294011 | Tenda A18 HTTP POST Request SetCmdlineRun stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485802",
          "name" : "Submit #485802 | Tenda Tenda A18 V15.13.07.09 V15.13.07.09 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Tenda A18 up to 15.13.07.09. It has been rated as critical. This issue affects the function SetCmdlineRun of the file /goform/SetCmdlineRun of the component HTTP POST Request Handler. The manipulation of the argument wpapsk_crypto5g leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:a18_firmware:15.13.07.09:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:a18:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T02:15Z",
    "lastModifiedDate" : "2025-03-06T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0849",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Sensitive%20Super%20Admin%20Data%20Exposure%20and%20Unauthorized%20Data%20Update%20via%20IDOR%20(Teacher%20Role%20to%20Super%20Admin%20Role).pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Sensitive%20Super%20Admin%20Data%20Exposure%20and%20Unauthorized%20Data%20Update%20via%20IDOR%20(Teacher%20Role%20to%20Super%20Admin%20Role).pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294012",
          "name" : "VDB-294012 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.294012",
          "name" : "VDB-294012 | CampCodes School Management Software Staff edit-staff improper authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.487618",
          "name" : "Submit #487618 | CampCodes School Management Software 1.0 Improper Privilege Management",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in CampCodes School Management Software 1.0. Affected is an unknown function of the file /edit-staff/ of the component Staff Handler. The manipulation leads to improper authorization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-01-30T02:15Z",
    "lastModifiedDate" : "2025-02-04T16:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0851",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-003/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-003/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/deepjavalibrary/djl/security/advisories/GHSA-jcrp-x7w3-ffmg",
          "name" : "https://github.com/deepjavalibrary/djl/security/advisories/GHSA-jcrp-x7w3-ffmg",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A path traversal issue in ZipUtils.unzip and TarUtils.untar in Deep Java Library (DJL) on all platforms allows a bad actor to write files to arbitrary locations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-29T22:15Z",
    "lastModifiedDate" : "2025-01-29T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0853",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.potenzaglobalsolutions.com/docs/ciyashop-wp/changelog/",
          "name" : "https://docs.potenzaglobalsolutions.com/docs/ciyashop-wp/changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca41c951-318f-47a7-9a30-c1d4eea1b1b5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ca41c951-318f-47a7-9a30-c1d4eea1b1b5?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The PGS Core plugin for WordPress is vulnerable to SQL Injection via the 'event' parameter in the 'save_header_builder' function in all versions up to, and including, 5.8.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query. This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-06T22:15Z",
    "lastModifiedDate" : "2025-05-06T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0855",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.potenzaglobalsolutions.com/docs/ciyashop-wp/changelog/",
          "name" : "https://docs.potenzaglobalsolutions.com/docs/ciyashop-wp/changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5dfc2249-3761-49c6-966e-73c33be74c0e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5dfc2249-3761-49c6-966e-73c33be74c0e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The PGS Core plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 5.8.0 via deserialization of untrusted input in the 'import_header' function. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software. If a POP chain is present via an additional plugin or theme installed on the target system, it could allow the attacker to delete arbitrary files, retrieve sensitive data, or execute code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-06T23:15Z",
    "lastModifiedDate" : "2025-05-06T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0856",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.potenzaglobalsolutions.com/docs/ciyashop-wp/changelog/",
          "name" : "https://docs.potenzaglobalsolutions.com/docs/ciyashop-wp/changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c33b1cb-6eb1-48cd-b706-5ec270f4ae7e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7c33b1cb-6eb1-48cd-b706-5ec270f4ae7e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The PGS Core plugin for WordPress is vulnerable to unauthorized access, modification, and loss of data due to a missing capability check on multiple functions in all versions up to, and including, 5.8.0. This makes it possible for unauthenticated attackers to add, modify, or plugin options."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-05-06T23:15Z",
    "lastModifiedDate" : "2025-05-06T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0858",
        "ASSIGNER" : "hp-security-alert@hp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hp.com/us-en/document/ish_11926124-11926148-16/hpsbpy03996",
          "name" : "https://support.hp.com/us-en/document/ish_11926124-11926148-16/hpsbpy03996",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was discovered in the firmware builds up to 8.2.1.0820 in certain Poly devices. The firmware flaw does not properly prevent path traversal and could lead to information disclosure."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T15:15Z",
    "lastModifiedDate" : "2025-03-27T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0859",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/BoldGrid/post-and-page-builder/pull/638/commits/10e4d1d96fd2735379049259d15896fa6dd35471",
          "name" : "https://github.com/BoldGrid/post-and-page-builder/pull/638/commits/10e4d1d96fd2735379049259d15896fa6dd35471",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/post-and-page-builder/trunk/includes/class-boldgrid-editor-preview.php#L178",
          "name" : "https://plugins.trac.wordpress.org/browser/post-and-page-builder/trunk/includes/class-boldgrid-editor-preview.php#L178",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?old=3234175&old_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php&new=3234175&new_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php",
          "name" : "https://plugins.trac.wordpress.org/changeset?old=3234175&old_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php&new=3234175&new_path=post-and-page-builder%2Ftags%2F1.27.7%2Fincludes%2Fclass-boldgrid-editor-preview.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/post-and-page-builder/#developers",
          "name" : "https://wordpress.org/plugins/post-and-page-builder/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/111a1e7f-bc87-4130-a0b2-422d0f98afb6?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/111a1e7f-bc87-4130-a0b2-422d0f98afb6?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Post and Page Builder by BoldGrid – Visual Drag and Drop Editor plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 1.27.6 via the template_via_url() function. This makes it possible for authenticated attackers, with Contributor-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:boldgrid:post_and_page_builder:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.27.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-06T10:15Z",
    "lastModifiedDate" : "2025-03-19T20:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0860",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/vr-frases/tags/3.0.1/includes/vr-frases-admin.php",
          "name" : "https://plugins.svn.wordpress.org/vr-frases/tags/3.0.1/includes/vr-frases-admin.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ea3e03-fafa-431e-b1fe-a527f491da79?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f5ea3e03-fafa-431e-b1fe-a527f491da79?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via several parameters in all versions up to, and including, 3.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vruiz:vr-frases:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "3.0.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-30T10:15Z",
    "lastModifiedDate" : "2025-01-31T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0861",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/vr-frases/tags/3.0.1/includes/vr-frases-admin.php",
          "name" : "https://plugins.svn.wordpress.org/vr-frases/tags/3.0.1/includes/vr-frases-admin.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9d5afb-d38d-442c-8511-f1683739a1da?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1d9d5afb-d38d-442c-8511-f1683739a1da?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The VR-Frases (collect & share quotes) plugin for WordPress is vulnerable to SQL Injection via several parameters in all versions up to, and including, 3.0.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vruiz:vr-frases:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "3.0.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T10:15Z",
    "lastModifiedDate" : "2025-01-31T20:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0862",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/supersaas-appointment-scheduling/tags/2.1.12/includes/shortcode.php#L15",
          "name" : "https://plugins.trac.wordpress.org/browser/supersaas-appointment-scheduling/tags/2.1.12/includes/shortcode.php#L15",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/supersaas-appointment-scheduling/tags/2.1.12/includes/shortcode.php#L31",
          "name" : "https://plugins.trac.wordpress.org/browser/supersaas-appointment-scheduling/tags/2.1.12/includes/shortcode.php#L31",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3235242/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3235242/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8698255b-6c03-464b-8cb5-191d3e77009f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8698255b-6c03-464b-8cb5-191d3e77009f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SuperSaaS – online appointment scheduling plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘after’ parameter in all versions up to, and including, 2.1.12 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This is limited to Chromium-based browsers (e.g. Chrome, Edge, Brave)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-11T11:15Z",
    "lastModifiedDate" : "2025-02-11T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0863",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/flexmls-idx/tags/3.14.25/flexmls_connect.php#L92",
          "name" : "https://plugins.trac.wordpress.org/browser/flexmls-idx/tags/3.14.25/flexmls_connect.php#L92",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/flexmls-idx/tags/3.14.25/lib/base.php#L220",
          "name" : "https://plugins.trac.wordpress.org/browser/flexmls-idx/tags/3.14.25/lib/base.php#L220",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3251292%40flexmls-idx&new=3251292%40flexmls-idx&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3251292%40flexmls-idx&new=3251292%40flexmls-idx&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c8e814b-3828-4b3f-a9ad-b3758ab9b109?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c8e814b-3828-4b3f-a9ad-b3758ab9b109?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Flexmls® IDX Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'idx_frame' shortcode in all versions up to, and including, 3.14.27 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-07T08:15Z",
    "lastModifiedDate" : "2025-03-07T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0864",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1624",
          "name" : "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1624",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L88",
          "name" : "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L88",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3235888%40profit-products-tables-for-woocommerce&new=3235888%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3235888%40profit-products-tables-for-woocommerce&new=3235888%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f93dcb51-1caf-4d63-a8f3-f6251dd0d19f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f93dcb51-1caf-4d63-a8f3-f6251dd0d19f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'shortcodes_set' parameter in all versions up to, and including, 1.0.6.6 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pluginus:active_products_tables_for_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.0.6.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-18T08:15Z",
    "lastModifiedDate" : "2025-02-21T15:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0865",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-media-category-management/tags/2.3.3/include/admin/class-WP_MCM_Render_Settings.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-media-category-management/tags/2.3.3/include/admin/class-WP_MCM_Render_Settings.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-media-category-management/trunk/include/admin/class-WP_MCM_Settings.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-media-category-management/trunk/include/admin/class-WP_MCM_Settings.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-media-category-management/trunk/include/class-WP_MCM_Options.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-media-category-management/trunk/include/class-WP_MCM_Options.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3242626/wp-media-category-management/trunk/include/admin/class-WP_MCM_Settings.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3242626/wp-media-category-management/trunk/include/admin/class-WP_MCM_Settings.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-media-category-management/#developers",
          "name" : "https://wordpress.org/plugins/wp-media-category-management/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d42ca2f-f061-4cd1-812b-46d42c440498?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0d42ca2f-f061-4cd1-812b-46d42c440498?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Media Category Management plugin for WordPress is vulnerable to Cross-Site Request Forgery in versions 2.0 to 2.3.3. This is due to missing or incorrect nonce validation on the wp_mcm_handle_action_settings() function. This makes it possible for unauthenticated attackers to alter plugin settings, such as the taxonomy used for media, the base slug for media categories, and the default media category via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:de-baat:wp_media_category_management:*:*:*:*:*:wordpress:*:*",
          "versionStartIncluding" : "2.0.0",
          "versionEndExcluding" : "2.4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-19T08:15Z",
    "lastModifiedDate" : "2025-03-06T12:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0866",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/legoeso-pdf-manager/trunk/inc/admin/class-pdf-doc-list-table.php#L543",
          "name" : "https://plugins.trac.wordpress.org/browser/legoeso-pdf-manager/trunk/inc/admin/class-pdf-doc-list-table.php#L543",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/legoeso-pdf-manager/trunk/inc/admin/class-pdf-doc-list-table.php#L567",
          "name" : "https://plugins.trac.wordpress.org/browser/legoeso-pdf-manager/trunk/inc/admin/class-pdf-doc-list-table.php#L567",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/legoeso-pdf-manager/#developers",
          "name" : "https://wordpress.org/plugins/legoeso-pdf-manager/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e640767-7998-4404-a894-0b1794464c66?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5e640767-7998-4404-a894-0b1794464c66?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Legoeso PDF Manager plugin for WordPress is vulnerable to time-based SQL Injection via the ‘checkedVals’ parameter in all versions up to, and including, 1.2.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Author-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:legoeso:pdf_manager:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-20T10:15Z",
    "lastModifiedDate" : "2025-02-25T18:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0867",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
          "name" : "https://cdn.sick.com/media/docs/1/11/411/Special_information_CYBERSECURITY_BY_SICK_en_IM0084411.PDF",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0001.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The standard user uses the run as function to start the MEAC applications with administrative privileges. To ensure that the system can startup on its own, the credentials of the administrator were stored. Consequently, the EPC2 user can execute any command with administrative privileges. This allows a privilege escalation to the administrative level."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T13:15Z",
    "lastModifiedDate" : "2025-02-14T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0868",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/02/CVE-2025-0868/",
          "name" : "https://cert.pl/en/posts/2025/02/CVE-2025-0868/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/02/CVE-2025-0868/",
          "name" : "https://cert.pl/posts/2025/02/CVE-2025-0868/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/arc53/DocsGPT",
          "name" : "https://github.com/arc53/DocsGPT",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, that could result in Remote Code Execution (RCE), has been found in DocsGPT. Due to improper parsing of JSON data using eval() an unauthorized attacker could send arbitrary Python code to be executed via /api/remote endpoint.\n\nThis issue affects DocsGPT: from 0.8.1 through 0.12.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T12:15Z",
    "lastModifiedDate" : "2025-02-20T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0869",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294055",
          "name" : "VDB-294055 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294055",
          "name" : "VDB-294055 | Cianet ONU GW24AC Login cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489867",
          "name" : "Submit #489867 | Cianet ONU  GW24AC Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Cianet ONU GW24AC up to 20250127. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Login. The manipulation of the argument browserLang leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-30T13:15Z",
    "lastModifiedDate" : "2025-02-07T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0870",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/axiomatic-systems/Bento4/issues/980",
          "name" : "https://github.com/axiomatic-systems/Bento4/issues/980",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/user-attachments/files/16929290/Bug2.zip",
          "name" : "https://github.com/user-attachments/files/16929290/Bug2.zip",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294056",
          "name" : "VDB-294056 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294056",
          "name" : "VDB-294056 | Axiomatic Bento4 Ap4DataBuffer.h GetData heap-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Axiomatic Bento4 up to 1.6.0-641. It has been rated as critical. Affected by this issue is the function AP4_DataBuffer::GetData in the library Ap4DataBuffer.h. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:axiosys:bento4:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "1.6.0-641",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T13:15Z",
    "lastModifiedDate" : "2025-02-28T22:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0871",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Upgradeextension/Maybecms/blob/main/README.md",
          "name" : "https://github.com/Upgradeextension/Maybecms/blob/main/README.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294057",
          "name" : "VDB-294057 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294057",
          "name" : "VDB-294057 | Maybecms Add Article index.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.487930",
          "name" : "Submit #487930 | Maybecms 1.2 Storage XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Maybecms 1.2. This affects an unknown part of the file /mb/admin/index.php?u=article-edit of the component Add Article. The manipulation of the argument data_info[content] leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-01-30T15:15Z",
    "lastModifiedDate" : "2025-01-30T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0872",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/3",
          "name" : "https://github.com/magic2353112890/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294066",
          "name" : "VDB-294066 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294066",
          "name" : "VDB-294066 | itsourcecode Tailoring Management System addpayment.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.487953",
          "name" : "Submit #487953 | itsourcecode Tailoring Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file /addpayment.php. The manipulation of the argument id/amount/desc/inccat leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T16:15Z",
    "lastModifiedDate" : "2025-02-07T14:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0873",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/5",
          "name" : "https://github.com/magic2353112890/cve/issues/5",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294067",
          "name" : "VDB-294067 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294067",
          "name" : "VDB-294067 | itsourcecode Tailoring Management System customeredit.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.487984",
          "name" : "Submit #487984 | itsourcecode Tailoring Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /customeredit.php. The manipulation of the argument id/address/fullname/phonenumber/email/city/comment leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T17:15Z",
    "lastModifiedDate" : "2025-02-07T14:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0874",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/magic2353112890/cve/issues/8",
          "name" : "https://github.com/magic2353112890/cve/issues/8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294068",
          "name" : "VDB-294068 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294068",
          "name" : "VDB-294068 | code-projects Simple Plugins Car Rental Management approve.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.488538",
          "name" : "Submit #488538 | Simple Plugins Car Rental Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in code-projects Simple Plugins Car Rental Management 1.0. Affected by this issue is some unknown functionality of the file /admin/approve.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:simple_car_rental_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T18:15Z",
    "lastModifiedDate" : "2025-02-21T21:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0877",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0059",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0059",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in AtaksAPP Reservation Management System allows Cross-Site Scripting (XSS).This issue affects Reservation Management System: before 4.2.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-06T14:15Z",
    "lastModifiedDate" : "2025-03-06T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0880",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294125",
          "name" : "VDB-294125 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294125",
          "name" : "VDB-294125 | Codezips Gym Management System updateplan.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.488716",
          "name" : "Submit #488716 | Codezips Gym Management System in PHP with Source Code   V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/u21735104/brookes/za83ilxr9g2fkv8b",
          "name" : "https://www.yuque.com/u21735104/brookes/za83ilxr9g2fkv8b",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/admin/updateplan.php. The manipulation of the argument planid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-25T19:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0881",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wizdzz/CVE/issues/1",
          "name" : "https://github.com/wizdzz/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/wizdzz/CVE/issues/1",
          "name" : "https://github.com/wizdzz/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294126",
          "name" : "VDB-294126 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294126",
          "name" : "VDB-294126 | Codezips Gym Management System saveroutine.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.489192",
          "name" : "Submit #489192 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/saveroutine.php. The manipulation of the argument rname leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-04-23T21:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0882",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/LamentXU123/cve/blob/main/sql_injection3.md",
          "name" : "https://github.com/LamentXU123/cve/blob/main/sql_injection3.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294127",
          "name" : "VDB-294127 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294127",
          "name" : "VDB-294127 | code-projects Chat System addnewmember.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.491463",
          "name" : "Submit #491463 | code-projects Chat System Using PHP With Source Code 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Chat System up to 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /user/addnewmember.php. The manipulation of the argument user leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-30T21:15Z",
    "lastModifiedDate" : "2025-02-25T19:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0883",
        "ASSIGNER" : "security@opentext.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-81"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://portal.microfocus.com/s/article/KM000037099?language=en_US",
          "name" : "https://portal.microfocus.com/s/article/KM000037099?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Script in an Error Message Web Page vulnerability in OpenText™ Service Manager. \n\nThe vulnerability could reveal sensitive information retained by the browser.\n\nThis issue affects Service Manager: 9.70, 9.71, 9.72, 9.80."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-03-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0884",
        "ASSIGNER" : "security@opentext.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-428"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://portal.microfocus.com/s/article/KM000036731?language=en_US",
          "name" : "https://portal.microfocus.com/s/article/KM000036731?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unquoted Search Path or Element vulnerability in OpenText™ Service Manager. \n\nThe vulnerability could allow a user to gain SYSTEM privileges through Privilege Escalation.\n\nThis issue affects Service Manager: 9.70, 9.71, 9.72."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-03-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0885",
        "ASSIGNER" : "security@opentext.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://portal.microfocus.com/s/article/KM000041560?language=en_US",
          "name" : "https://portal.microfocus.com/s/article/KM000041560?language=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Authorization vulnerability in OpenText™ GroupWise allows Exploiting Incorrectly Configured Access Control Security Levels.\n\nThe vulnerability could allow unauthorized access to calendar items marked private.\n\nThis issue affects GroupWise versions 7 through 17.5, 23.4, 24.1, 24.2, 24.3, 24.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-03T10:15Z",
    "lastModifiedDate" : "2025-07-03T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0886",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.lenovo.com/us/en/product_security/LEN-182738",
          "name" : "https://support.lenovo.com/us/en/product_security/LEN-182738",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect permissions vulnerability was reported in Elliptic Labs Virtual Lock Sensor that could allow a local, authenticated user to escalate privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-17T20:15Z",
    "lastModifiedDate" : "2025-07-17T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0889",
        "ASSIGNER" : "secure@beyondtrust.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.beyondtrust.com/trust-center/security-advisories/bt25-01",
          "name" : "https://www.beyondtrust.com/trust-center/security-advisories/bt25-01",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Prior to 25.2, a local authenticated attacker can elevate privileges on a system with Privilege Management for Windows installed, via the manipulation of COM objects under certain circumstances where an EPM policy allows for automatic privilege elevation of a user process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:beyondtrust:privilege_management_for_windows:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "25.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-26T08:13Z",
    "lastModifiedDate" : "2025-07-31T17:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0890",
        "ASSIGNER" : "security@zyxel.com.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025",
          "name" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-command-injection-and-insecure-default-credentials-vulnerabilities-in-certain-legacy-dsl-cpe-02-04-2025",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "**UNSUPPORTED WHEN ASSIGNED**\nInsecure default credentials for the Telnet function in the legacy DSL CPE Zyxel VMG4325-B10A firmware version 1.00(AAFR.4)C0_20170615 could allow an attacker to log in to the management interface if the administrators have the option to change the default credentials but fail to do so."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T11:15Z",
    "lastModifiedDate" : "2025-02-04T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0893",
        "ASSIGNER" : "secure@symantec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25417",
          "name" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25417",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T18:15Z",
    "lastModifiedDate" : "2025-02-27T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0895",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-215"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7184430",
          "name" : "https://www.ibm.com/support/pages/node/7184430",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cognos Analytics Mobile 1.1 for Android could allow a user with physical access to the device, to obtain sensitive information from debugging code log messages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics_mobile:*:*:*:*:*:android:*:*",
          "versionStartIncluding" : "1.1.0",
          "versionEndExcluding" : "1.1.21",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-02T16:15Z",
    "lastModifiedDate" : "2025-07-31T17:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0896",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-02",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-02",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Orthanc server prior to version 1.5.8 does not enable basic authentication by default when remote access is enabled. This could result in unauthorized access by an attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:orthanc-server:orthanc:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.5.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T02:15Z",
    "lastModifiedDate" : "2025-07-30T18:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0897",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/modal-window/trunk/public/class-shortcodes.php#L70",
          "name" : "https://plugins.trac.wordpress.org/browser/modal-window/trunk/public/class-shortcodes.php#L70",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3243077/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3243077/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/modal-window/#developers",
          "name" : "https://wordpress.org/plugins/modal-window/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/de4dfcc7-fcc0-46e5-8452-98783007368d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/de4dfcc7-fcc0-46e5-8452-98783007368d?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Modal Window – create popup modal window plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'iframeBox' shortcode in all versions up to, and including, 6.1.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wow-company:modal_window:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "6.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-20T09:15Z",
    "lastModifiedDate" : "2025-02-25T20:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0899",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-061/",
          "name" : "ZDI-25-061",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor AcroForm Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of AcroForms. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25349."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.1.389",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0900",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-086/",
          "name" : "ZDI-25-086",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor PDF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of PDF files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25368."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-tools:10.4.0.388:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:10.4.0.388:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_pro:10.4.0.388:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T21:15Z",
    "lastModifiedDate" : "2025-07-07T18:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0901",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-062/",
          "name" : "ZDI-25-062",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor Doc Object Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the handling of Doc objects. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25372."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.1.389",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0902",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-072/",
          "name" : "ZDI-25-072",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25405."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0903",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-070/",
          "name" : "ZDI-25-070",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor RTF File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of RTF files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25421."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0904",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-071/",
          "name" : "ZDI-25-071",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25422."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0905",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-067/",
          "name" : "ZDI-25-067",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25433."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0906",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-068/",
          "name" : "ZDI-25-068",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25434."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0907",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-069/",
          "name" : "ZDI-25-069",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor JB2 File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of JB2 files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25435."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0908",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-063/",
          "name" : "ZDI-25-063",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25557."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.4.2.390",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0909",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-064/",
          "name" : "ZDI-25-064",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor XPS File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of XPS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25678."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.5.0.393",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0910",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-065/",
          "name" : "ZDI-25-065",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a write  past the end of an allocated object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25748."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.5.0.393",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0911",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-066/",
          "name" : "ZDI-25-066",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PDF-XChange Editor U3D File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of U3D files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated object. An attacker can leverage this in conjunction with other vulnerabilities to execute arbitrary code in the context of the current process. Was ZDI-CAN-25957."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pdf-xchange:pdf-xchange_editor:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "10.5.0.393",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-12T19:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0912",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/impress-org/givewp/pull/7679/files",
          "name" : "https://github.com/impress-org/givewp/pull/7679/files",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donations/Properties/BillingAddress.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donations/Properties/BillingAddress.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donations/Repositories/DonationRepository.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donations/Repositories/DonationRepository.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donors/Repositories/DonorRepository.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234114/give/trunk/src/Donors/Repositories/DonorRepository.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3234114%40give&new=3234114%40give&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3234114%40give&new=3234114%40give&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8ae1b0-e9a0-4179-970b-dbcb0642547c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8a8ae1b0-e9a0-4179-970b-dbcb0642547c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Donations Widget plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 3.19.4 via deserialization of untrusted input from the Donation Form through the 'card_address' parameter. This makes it possible for unauthenticated attackers to inject a PHP Object. The additional presence of a POP chain allows attackers to achieve remote code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:givewp:givewp:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.20.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0913",
        "ASSIGNER" : "security@golang.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-59"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://go.dev/cl/672396",
          "name" : "https://go.dev/cl/672396",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://go.dev/issue/73702",
          "name" : "https://go.dev/issue/73702",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A",
          "name" : "https://groups.google.com/g/golang-announce/c/ufZ8WpEsA3A",
          "refsource" : "",
          "tags" : [ "Mailing List" ]
        }, {
          "url" : "https://pkg.go.dev/vuln/GO-2025-3750",
          "name" : "https://pkg.go.dev/vuln/GO-2025-3750",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "os.OpenFile(path, os.O_CREATE|O_EXCL) behaved differently on Unix and Windows systems when the target path was a dangling symlink. On Unix systems, OpenFile with O_CREATE and O_EXCL flags never follows symlinks. On Windows, when the target path was a symlink to a nonexistent location, OpenFile would create a file in that location. OpenFile now always returns an error when the O_CREATE and O_EXCL flags are both set and the target path is a symlink."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "1.23.10",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:golang:go:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "1.24.0",
            "versionEndExcluding" : "1.24.4",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-11T18:15Z",
    "lastModifiedDate" : "2025-08-08T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0914",
        "ASSIGNER" : "cve@rapid7.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.velociraptor.app/announcements/advisories/cve-2025-0914/",
          "name" : "https://docs.velociraptor.app/announcements/advisories/cve-2025-0914/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper access control issue in the VQL shell feature in Velociraptor Versions < 0.73.4 allowed authenticated users to execute the execve() plugin in deployments where this was explicitly forbidden by configuring the prevent_execve flag in the configuration file. This setting is not usually recommended and is uncommonly used, so this issue will only affect users who do set it. This issue is fixed in release 0.73.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T16:15Z",
    "lastModifiedDate" : "2025-02-27T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0915",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232529",
          "name" : "https://www.ibm.com/support/pages/node/7232529",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 \n\n\n\nunder specific configurations could allow an authenticated user to cause a denial of service due to insufficient release of allocated memory resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "11.5",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "11.5",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "11.5",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-05T21:15Z",
    "lastModifiedDate" : "2025-05-13T19:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0916",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/yaysmtp/trunk/includes/Functions.php",
          "name" : "https://plugins.trac.wordpress.org/browser/yaysmtp/trunk/includes/Functions.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/yaysmtp/trunk/includes/Helper/Utils.php",
          "name" : "https://plugins.trac.wordpress.org/browser/yaysmtp/trunk/includes/Helper/Utils.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3238172",
          "name" : "https://plugins.trac.wordpress.org/changeset/3238172",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/yaysmtp/#developers",
          "name" : "https://wordpress.org/plugins/yaysmtp/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/209019bd-b214-4389-a972-42e38d501203?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/209019bd-b214-4389-a972-42e38d501203?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The YaySMTP and Email Logs: Amazon SES, SendGrid, Outlook, Mailgun, Brevo, Google and Any SMTP Service plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions 2.4.9 to 2.6.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. Note: The vulnerability has been initially patched in version 2.4.8 and was reintroduced in version 2.4.9 with the removal of the wp_kses_post() built-in WordPress sanitization function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
          "versionStartIncluding" : "2.4.9",
          "versionEndExcluding" : "2.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-19T12:15Z",
    "lastModifiedDate" : "2025-02-25T20:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0917",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7234674",
          "name" : "https://www.ibm.com/support/pages/node/7234674",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 is vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.2.0",
          "versionEndIncluding" : "11.2.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndIncluding" : "12.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-11T18:15Z",
    "lastModifiedDate" : "2025-06-17T20:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0918",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/smtp-sendgrid/trunk/includes/Functions.php",
          "name" : "https://plugins.trac.wordpress.org/browser/smtp-sendgrid/trunk/includes/Functions.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3056461/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3056461/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234377/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234377/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/smtp-sendgrid/#developers",
          "name" : "https://wordpress.org/plugins/smtp-sendgrid/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b98f2a85-9535-4bf5-900c-f4f630c7b502?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b98f2a85-9535-4bf5-900c-f4f630c7b502?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SMTP for SendGrid – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.3.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-22T13:15Z",
    "lastModifiedDate" : "2025-03-05T21:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0919",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-0818. Reason: This candidate is a reservation duplicate of CVE-2025-0818. Notes: All CVE users should reference CVE-2025-0818 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T17:15Z",
    "lastModifiedDate" : "2025-02-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0921",
        "ASSIGNER" : "Mitsubishielectric.Psirt@yd.MitsubishiElectric.co.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/vu/JVNVU93838985",
          "name" : "https://jvn.jp/vu/JVNVU93838985",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-04",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-140-04",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2025-002_en.pdf",
          "name" : "https://www.mitsubishielectric.com/en/psirt/vulnerability/pdf/2025-002_en.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Execution with Unnecessary Privileges vulnerability in multiple services of Mitsubishi Electric Iconics Digital Solutions GENESIS64 all versions, Mitsubishi Electric Iconics Digital Solutions GENESIS version 11.00, Mitsubishi Electric GENESIS64 all versions, Mitsubishi Electric MC Works64 all versions, and Mitsubishi Electric GENESIS version 11.00 allows a local authenticated attacker to make an unauthorized write to arbitrary files, by creating a symbolic link from a file used as a write destination by the services of the affected products to a target file. This could allow the attacker to destroy the file on a PC with the affected products installed, resulting in a denial-of-service (DoS) condition on the PC if the destroyed file is necessary for the operation of the PC."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T23:15Z",
    "lastModifiedDate" : "2025-08-06T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0923",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-540"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7234674",
          "name" : "https://www.ibm.com/support/pages/node/7234674",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cognos Analytics 11.2.0, 11.2.1, 11.2.2, 11.2.3, 11.2.4, 12.0.0, 12.0.1, 12.0.2, 12.0.3, and 12.0.4 stores source code on the web server that could aid in further attacks against the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "11.2.0",
          "versionEndIncluding" : "11.2.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndIncluding" : "12.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cognos_analytics:11.2.4:fixpack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-11T18:15Z",
    "lastModifiedDate" : "2025-06-17T20:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0924",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-security-audit-log/trunk/classes/Controllers/class-alert.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-security-audit-log/trunk/classes/Controllers/class-alert.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-security-audit-log/trunk/classes/Controllers/class-alert-manager.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-security-audit-log/trunk/classes/Controllers/class-alert-manager.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3238760/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3238760/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-security-audit-log/#developers",
          "name" : "https://wordpress.org/plugins/wp-security-audit-log/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/91699d32-1768-4d87-a4f2-91969b3e3355?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/91699d32-1768-4d87-a4f2-91969b3e3355?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Activity Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘message’ parameter in all versions up to, and including, 5.2.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:melapress:wp_activity_log:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-17T05:15Z",
    "lastModifiedDate" : "2025-05-23T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0925",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2025-0818. Reason: This candidate is a reservation duplicate of CVE-2025-0818. Notes: All CVE users should reference CVE-2025-0818 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T17:15Z",
    "lastModifiedDate" : "2025-02-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0926",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/9d/fe/3f/cve-2025-0926pdf-en-US-479105.pdf",
          "name" : "https://www.axis.com/dam/public/9d/fe/3f/cve-2025-0926pdf-en-US-479105.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Gee-netics, member of AXIS Camera Station Pro Bug Bounty Program, has found that it is possible for a non-admin user to remove system files causing a boot loop by redirecting a file deletion when recording video.\nAxis has released a patched version for the highlighted flaw. Please \nrefer to the Axis security advisory for more information and solution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T06:15Z",
    "lastModifiedDate" : "2025-04-23T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0927",
        "ASSIGNER" : "cve@kernel.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority. Filesystem bugs due to corrupt images are not considered a CVE for any filesystem that is only mountable by CAP_SYS_ADMIN in the initial user namespace. That includes delegated mounting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-23T15:15Z",
    "lastModifiedDate" : "2025-04-08T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0928",
        "ASSIGNER" : "security@ubuntu.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv",
          "name" : "https://github.com/juju/juju/security/advisories/GHSA-4vc8-wvhw-m5gv",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Juju versions prior to 3.6.8 and 2.9.52, any authenticated controller user was allowed to upload arbitrary agent binaries to any model or to the controller itself, without verifying model membership or requiring explicit permissions. This enabled the distribution of poisoned binaries to new or upgraded machines, potentially resulting in remote code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-08T18:15Z",
    "lastModifiedDate" : "2025-07-08T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0929",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability in TeamCal Neo, version 3.8.2. This could allow an attacker to retrieve, update and delete all database information by injecting a malicious SQL statement via the ‘abs’ parameter in ‘/teamcal/src/index.php’."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-31T14:15Z",
    "lastModifiedDate" : "2025-01-31T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0930",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-teamcal-neo",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Reflected Cross-Site Scripting (XSS) in TeamCal Neo, version 3.8.2. This allows an attacker to execute malicious JavaScript code, after injecting code via the ‘abs’ parameter in ‘/teamcal/src/index.php’."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-31T14:15Z",
    "lastModifiedDate" : "2025-01-31T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0932",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110626/latest/",
          "name" : "https://developer.arm.com/documentation/110626/latest/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use After Free vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to gain access to already freed memory.This issue affects Bifrost GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r48p0 through r49p3, from r50p0 through r54p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-04T10:15Z",
    "lastModifiedDate" : "2025-08-05T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0934",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment_call_job_search_ajax-sqli.pdf",
          "name" : "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment_call_job_search_ajax-sqli.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294243",
          "name" : "VDB-294243 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294243",
          "name" : "VDB-294243 | code-projects Job Recruitment _call_job_search_ajax.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.491802",
          "name" : "Submit #491802 | code-projects Job-recruitment-in-php v1.0 Sql injection",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Job Recruitment 1.0. It has been classified as problematic. This affects an unknown part of the file /parse/_call_job_search_ajax.php. The manipulation of the argument n leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-31T20:15Z",
    "lastModifiedDate" : "2025-02-18T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0935",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php#L6296",
          "name" : "https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php#L6296",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php#L697",
          "name" : "https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php#L697",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php#L7198",
          "name" : "https://plugins.trac.wordpress.org/browser/media-library-plus/trunk/media-library-plus.php#L7198",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234676/media-library-plus/trunk/media-library-plus.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234676/media-library-plus/trunk/media-library-plus.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f810102-cf25-4898-a3a6-3cdc9a96aaea?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f810102-cf25-4898-a3a6-3cdc9a96aaea?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Media Library Folders plugin for WordPress is vulnerable to unauthorized plugin settings change due to a missing capability check on several AJAX actions in all versions up to, and including, 8.3.0. This makes it possible for authenticated attackers, with Author-level access and above, to change plugin settings related to things such as IP-blocking."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:maxfoundry:media_library_folders:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "8.3.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-15T09:15Z",
    "lastModifiedDate" : "2025-02-24T12:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0936",
        "ASSIGNER" : "psirt@arista.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21394-security-advisory-0117",
          "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21394-security-advisory-0117",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21394-security-advisory-0117",
          "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21394-security-advisory-0117",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On affected platforms running Arista EOS with a gNMI transport enabled, running the gNOI File TransferToRemote RPC with credentials for a remote server may cause these remote-server credentials to be logged or accounted on the local EOS device or possibly on other remote accounting servers (i.e. TACACS, RADIUS, etc)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-07T23:15Z",
    "lastModifiedDate" : "2025-05-08T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0937",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-02-nomad-vulnerable-to-event-stream-namespace-acl-policy-bypass-through-wildcard-namespace/73191",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-02-nomad-vulnerable-to-event-stream-namespace-acl-policy-bypass-through-wildcard-namespace/73191",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Nomad Community and Nomad Enterprise (\"Nomad\") event stream configured with a wildcard namespace can bypass the ACL Policy allowing reads on other namespaces."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T19:15Z",
    "lastModifiedDate" : "2025-02-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0938",
        "ASSIGNER" : "cna@python.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba",
          "name" : "https://github.com/python/cpython/commit/526617ed68cde460236c973e5d0a8bad4de896ba",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403",
          "name" : "https://github.com/python/cpython/commit/90e526ae67b172ed7c6c56e7edad36263b0f9403",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568",
          "name" : "https://github.com/python/cpython/commit/a7084f6075c9595ba60119ce8c62f1496f50c568",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab",
          "name" : "https://github.com/python/cpython/commit/b8b4b713c5f8ec0958c7ef8d29d6711889bc94ab",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a",
          "name" : "https://github.com/python/cpython/commit/d89a5f6a6e65511a5f6e0618c4c30a7aa5aba56a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32",
          "name" : "https://github.com/python/cpython/commit/ff4e5c25666f63544071a6b075ae8b25c98b7a32",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/issues/105704",
          "name" : "https://github.com/python/cpython/issues/105704",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/pull/129418",
          "name" : "https://github.com/python/cpython/pull/129418",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/",
          "name" : "https://mail.python.org/archives/list/security-announce@python.org/thread/K4EUG6EKV6JYFIC24BASYOZS4M5XOQIB/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250314-0002/",
          "name" : "https://security.netapp.com/advisory/ntap-20250314-0002/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Python standard library functions `urllib.parse.urlsplit` and `urlparse` accepted domain names that included square brackets which isn't valid according to RFC 3986. Square brackets are only meant to be used as delimiters for specifying IPv6 and IPvFuture hosts in URLs. This could result in differential parsing across the Python URL parser and other specification-compliant URL parsers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-31T18:15Z",
    "lastModifiedDate" : "2025-03-14T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0939",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/magicform/trunk/admin/admin-menu.php",
          "name" : "https://plugins.trac.wordpress.org/browser/magicform/trunk/admin/admin-menu.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3497ae-7f3a-4e67-ad7a-77b50dccaf3b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/aa3497ae-7f3a-4e67-ad7a-77b50dccaf3b?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The MagicForm plugin for WordPress is vulnerable to access and modification of data due to a missing capability check on the plugin's AJAX actions in all versions up to, and including, 1.6.2. This makes it possible for authenticated attackers, with Subscriber-level access and above, to invoke those actions in order to delete or view logs, modify forms or modify plugin settings."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:dcooperman:magicform:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.6.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-01T07:15Z",
    "lastModifiedDate" : "2025-02-21T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0941",
        "ASSIGNER" : "ProductSecurity@beckman.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.beckman.com/about-us/compliance/coordinated-vulnerability-disclosure/product-security-updates",
          "name" : "https://www.beckman.com/about-us/compliance/coordinated-vulnerability-disclosure/product-security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MET ONE 3400+ instruments running software v1.0.41 can, under rare conditions, temporarily store credentials in plain text within the system. This data is not available to unauthenticated users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-02-26T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0942",
        "ASSIGNER" : "disclosure@vulncheck.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://community.jalios.com/jcms/jc2_734797/fr/avertissement-de-securite-2023-02-06",
          "name" : "https://community.jalios.com/jcms/jc2_734797/fr/avertissement-de-securite-2023-02-06",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://community.jalios.com/patchplugin-10.0.6",
          "name" : "https://community.jalios.com/patchplugin-10.0.6",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The DB chooser functionality in Jalios JPlatform 10 SP6 before 10.0.6 improperly neutralizes special elements used in an SQL command allows for unauthenticated users to trigger SQL Injection.\n\nThis issue affects JPlatform before 10.0.6 and a  PatchPlugin release 10.0.6 was issued 2023-02-06."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-07T22:15Z",
    "lastModifiedDate" : "2025-04-08T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0943",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294298",
          "name" : "VDB-294298 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294298",
          "name" : "VDB-294298 | itsourcecode Tailoring Management System deldoc.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.488498",
          "name" : "Submit #488498 | itsourcecode Tailoring Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been declared as critical. This vulnerability affects unknown code of the file deldoc.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T11:15Z",
    "lastModifiedDate" : "2025-02-07T14:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0944",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294299",
          "name" : "VDB-294299 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294299",
          "name" : "VDB-294299 | itsourcecode Tailoring Management System customerview.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Tailoring Management System 1.0. It has been rated as critical. This issue affects some unknown processing of the file customerview.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T13:15Z",
    "lastModifiedDate" : "2025-02-07T14:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0945",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294300",
          "name" : "VDB-294300 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294300",
          "name" : "VDB-294300 | itsourcecode Tailoring Management System typedelete.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in itsourcecode Tailoring Management System 1.0. Affected is an unknown function of the file typedelete.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T15:15Z",
    "lastModifiedDate" : "2025-02-07T14:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0946",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294301",
          "name" : "VDB-294301 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294301",
          "name" : "VDB-294301 | itsourcecode Tailoring Management System templatedelete.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in itsourcecode Tailoring Management System 1.0. Affected by this vulnerability is an unknown functionality of the file templatedelete.php. The manipulation of the argument id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T16:15Z",
    "lastModifiedDate" : "2025-02-07T13:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0947",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294302",
          "name" : "VDB-294302 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294302",
          "name" : "VDB-294302 | itsourcecode Tailoring Management System expview.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in itsourcecode Tailoring Management System 1.0. Affected by this issue is some unknown functionality of the file expview.php. The manipulation of the argument expid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T17:15Z",
    "lastModifiedDate" : "2025-05-13T19:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0948",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294303",
          "name" : "VDB-294303 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294303",
          "name" : "VDB-294303 | itsourcecode Tailoring Management System incview.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in itsourcecode Tailoring Management System 1.0. This affects an unknown part of the file incview.php. The manipulation of the argument incid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T18:15Z",
    "lastModifiedDate" : "2025-04-22T15:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0949",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294304",
          "name" : "VDB-294304 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294304",
          "name" : "VDB-294304 | itsourcecode Tailoring Management System partview.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in itsourcecode Tailoring Management System 1.0 and classified as critical. This vulnerability affects unknown code of the file partview.php. The manipulation of the argument typeid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T19:15Z",
    "lastModifiedDate" : "2025-04-22T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0950",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/magic2353112890/cve/issues/7",
          "name" : "https://github.com/magic2353112890/cve/issues/7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://itsourcecode.com/",
          "name" : "https://itsourcecode.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294305",
          "name" : "VDB-294305 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294305",
          "name" : "VDB-294305 | itsourcecode Tailoring Management System staffview.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in itsourcecode Tailoring Management System 1.0 and classified as critical. This issue affects some unknown processing of the file staffview.php. The manipulation of the argument staffid leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:angeljudesuarez:tailoring_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-01T20:15Z",
    "lastModifiedDate" : "2025-04-18T02:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0952",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/eco-nature-environment-ecology-wordpress-theme/8497776",
          "name" : "https://themeforest.net/item/eco-nature-environment-ecology-wordpress-theme/8497776",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba708a4f-d987-4d63-a218-2ed1c6daa010?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ba708a4f-d987-4d63-a218-2ed1c6daa010?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Eco Nature - Environment & Ecology WordPress Theme theme for WordPress is vulnerable to unauthorized modification of data that can lead to a denial of service due to a missing capability check on the 'cmsmasters_hide_admin_notice' AJAX action in all versions up to, and including, 2.0.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update option values to 'hide' on the WordPress site. This can be leveraged to update an option that would create an error on the site and deny service to legitimate users or be used to set some values to true such as registration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-03-14T06:15Z",
    "lastModifiedDate" : "2025-03-14T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0953",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Functions.php",
          "name" : "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Functions.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Helper/Utils.php",
          "name" : "https://plugins.trac.wordpress.org/browser/smtp-sendinblue/trunk/includes/Helper/Utils.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234379/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234379/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/smtp-sendinblue/#developers",
          "name" : "https://wordpress.org/plugins/smtp-sendinblue/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ba65ac-e568-4c13-961d-6453f281d9fc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e7ba65ac-e568-4c13-961d-6453f281d9fc?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SMTP for Sendinblue – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.1.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yaycommerce:yaysmtp:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-22T13:15Z",
    "lastModifiedDate" : "2025-03-05T21:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0954",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/wp-online-contract/7698011",
          "name" : "https://codecanyon.net/item/wp-online-contract/7698011",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/70f464ca-ff6c-4c2e-8b56-bf5e4bc6bd1f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/70f464ca-ff6c-4c2e-8b56-bf5e4bc6bd1f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Online Contract plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the json_import() and json_export() functions in all versions up to, and including, 5.1.4. This makes it possible for unauthenticated attackers to import and export the plugin's settings."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-05T10:15Z",
    "lastModifiedDate" : "2025-03-05T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0955",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/vidorev-video-wordpress-theme/21798615",
          "name" : "https://themeforest.net/item/vidorev-video-wordpress-theme/21798615",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c15662-e4df-4a74-bb01-266eeb4879c5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e8c15662-e4df-4a74-bb01-266eeb4879c5?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The VidoRev Extensions plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'vidorev_import_single_video' AJAX action in all versions up to, and including, 2.9.9.9.9.9.5. This makes it possible for unauthenticated attackers to import arbitrary youtube videos."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-14T05:15Z",
    "lastModifiedDate" : "2025-03-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0956",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/woocommerce-recover-abandoned-cart/7715167",
          "name" : "https://codecanyon.net/item/woocommerce-recover-abandoned-cart/7715167",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/067c974c-b3bb-4f06-8f7c-3963112c40d2?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/067c974c-b3bb-4f06-8f7c-3963112c40d2?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WooCommerce Recover Abandoned Cart plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 24.3.0 via deserialization of untrusted input from the 'raccookie_guest_email' cookie. This makes it possible for unauthenticated attackers to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T10:15Z",
    "lastModifiedDate" : "2025-03-05T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0957",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/smtp-amazon-ses/trunk/includes/Functions.php",
          "name" : "https://plugins.trac.wordpress.org/browser/smtp-amazon-ses/trunk/includes/Functions.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/smtp-amazon-ses/trunk/includes/Helper/Utils.php",
          "name" : "https://plugins.trac.wordpress.org/browser/smtp-amazon-ses/trunk/includes/Helper/Utils.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3234351/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3234351/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/smtp-amazon-ses/#developers",
          "name" : "https://wordpress.org/plugins/smtp-amazon-ses/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6424fc9-f118-4654-89a7-1f7e6efa2c02?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f6424fc9-f118-4654-89a7-1f7e6efa2c02?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SMTP for Amazon SES – YaySMTP plugin for WordPress is vulnerable to Stored Cross-Site Scripting in versions up to, and including, 1.7.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-22T14:15Z",
    "lastModifiedDate" : "2025-02-22T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0958",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ajax-actions/send-private-msg.php#L35",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ajax-actions/send-private-msg.php#L35",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ultimate-auction.php#L219",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ultimate-auction.php#L219",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ultimate-auction.php#L274",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-auction/trunk/ultimate-auction.php#L274",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3242416/ultimate-auction/trunk/ultimate-auction.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3242416/ultimate-auction/trunk/ultimate-auction.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/af3675c9-3a6b-4139-85e8-2fc57f290e82?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/af3675c9-3a6b-4139-85e8-2fc57f290e82?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate WordPress Auction Plugin plugin for WordPress is vulnerable to unauthorized access to functionality in all versions up to, and including, 4.2.9. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary auctions, posts as well as pages and allows them to execute other actions related to auction handling."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:auctionplugin:ultimate_auction:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.3.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-04T10:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0959",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-564"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
          "name" : "https://codecanyon.net/item/eventer-wordpress-event-manager-plugin/20972534",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bd42c89e-57db-458f-910c-404a5615f280?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bd42c89e-57db-458f-910c-404a5615f280?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Eventer - WordPress Event & Booking Manager Plugin plugin for WordPress is vulnerable to SQL Injection via the reg_id parameter in all versions up to, and including, 3.9.9.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imithemes:eventer:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.9.9.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-07T09:15Z",
    "lastModifiedDate" : "2025-03-13T14:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0960",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://community.automationdirect.com/s/cybersecurity/security-advisories",
          "name" : "https://community.automationdirect.com/s/cybersecurity/security-advisories",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-08",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-035-08",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "AutomationDirect C-more EA9 HMI contains a function with bounds checks that can be skipped, which could result in an attacker abusing the function to cause a denial-of-service condition or achieving remote code execution on the affected device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T20:15Z",
    "lastModifiedDate" : "2025-02-04T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0961",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_one/blob/main/xss.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_one/blob/main/xss.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294356",
          "name" : "VDB-294356 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294356",
          "name" : "VDB-294356 | code-projects Job Recruitment load_job-details.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.491789",
          "name" : "Submit #491789 | code-projects job-recruitment 1/0 php Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Job Recruitment 1.0. Affected by this issue is some unknown functionality of the file /_parse/load_job-details.php. The manipulation of the argument business_stream_name/company_website_url leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-01T23:15Z",
    "lastModifiedDate" : "2025-05-28T17:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0966",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7236613",
          "name" : "https://www.ibm.com/support/pages/node/7236613",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM InfoSphere Information Server 11.7 vulnerable to SQL injection. A remote attacker could send specially crafted SQL statements, which could allow the attacker to view, add, modify, or delete information in the back-end database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "11.7",
            "versionEndExcluding" : "11.7.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-06-25T03:15Z",
    "lastModifiedDate" : "2025-07-08T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0967",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Team-intN18-SoybeanSeclab/CVE/blob/main/sqlinject1.md",
          "name" : "https://github.com/Team-intN18-SoybeanSeclab/CVE/blob/main/sqlinject1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294359",
          "name" : "VDB-294359 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294359",
          "name" : "VDB-294359 | code-projects Chat System add_chatroom.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.492911",
          "name" : "Submit #492911 | code-projects Chat System Using PHP With Source Code 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Chat System 1.0 and classified as critical. This issue affects some unknown processing of the file /user/add_chatroom.php. The manipulation of the argument chatname/chatpass leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:chat_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-02T16:15Z",
    "lastModifiedDate" : "2025-02-25T19:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0968",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/modules/megamenu/api.php#L47",
          "name" : "https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/modules/megamenu/api.php#L47",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3237243/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3237243/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/elementskit-lite/#developers",
          "name" : "https://wordpress.org/plugins/elementskit-lite/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/432ac3b1-8f1d-442f-8e8d-62a1f26ba259?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/432ac3b1-8f1d-442f-8e8d-62a1f26ba259?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 3.4.0  due to a missing capability checks on the get_megamenu_content() function. This makes it possible for unauthenticated attackers to view any item created in Elementor, such as posts, pages and templates including drafts, trashed and private items."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.4.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-19T12:15Z",
    "lastModifiedDate" : "2025-02-25T20:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0970",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294361",
          "name" : "VDB-294361 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294361",
          "name" : "VDB-294361 | Zenvia Movidesk Login redirect",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.485985",
          "name" : "Submit #485985 | zenvia movidesk < 25.01.15.86c796efe6 Open Redirect",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Zenvia Movidesk up to 25.01.22. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /Account/Login. The manipulation of the argument ReturnUrl leads to open redirect. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 25.01.22.245a473c54 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-02T23:15Z",
    "lastModifiedDate" : "2025-02-02T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0971",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294362",
          "name" : "VDB-294362 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294362",
          "name" : "VDB-294362 | Zenvia Movidesk Profile Editing EditProfile cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.486023",
          "name" : "Submit #486023 | zenvia movidesk 25.01.15.86c796efe6 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Zenvia Movidesk up to 25.01.22. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /Account/EditProfile of the component Profile Editing. The manipulation of the argument username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 25.01.22.245a473c54 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-03T00:15Z",
    "lastModifiedDate" : "2025-02-03T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0972",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves/blob/main/Moviedesk%20-%20Stored%20Cross%20Site%20Script%20On%20Create%20TIcket%20Field.pdf",
          "name" : "https://github.com/yago3008/cves/blob/main/Moviedesk%20-%20Stored%20Cross%20Site%20Script%20On%20Create%20TIcket%20Field.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294363",
          "name" : "VDB-294363 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294363",
          "name" : "VDB-294363 | Zenvia Movidesk New Ticket cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.488106",
          "name" : "Submit #488106 | zenvia movidesk < 25.01.22.245a473c54 Stored Cross Site Script",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Zenvia Movidesk up to 25.01.22. This affects an unknown part of the component New Ticket Handler. The manipulation of the argument subject leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 25.01.22.245a473c54 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-03T00:15Z",
    "lastModifiedDate" : "2025-02-03T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0973",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-V7.7.7.9%2020240105-Directory%20Traversal.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-V7.7.7.9%2020240105-Directory%20Traversal.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294364",
          "name" : "VDB-294364 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294364",
          "name" : "VDB-294364 | CmsEasy index.php backAll_action path traversal",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.487649",
          "name" : "Submit #487649 | ?????????????????? SiPing Shi JiuZhou Yitong KeJi YouXianGongSi CmsEasy V7.7.7.9 Path Traversal",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in CmsEasy 7.7.7.9. This vulnerability affects the function backAll_action in the library lib/admin/database_admin.php of the file /index.php?case=database&act=backAll&admin_dir=admin&site=default. The manipulation of the argument select[] leads to path traversal. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-03T01:15Z",
    "lastModifiedDate" : "2025-02-28T22:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0974",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/f8153d7d535c0fcba920e83a64953d4e",
          "name" : "https://gist.github.com/mcdruid/f8153d7d535c0fcba920e83a64953d4e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294365",
          "name" : "VDB-294365 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294365",
          "name" : "VDB-294365 | MaxD Lightning Module deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489672",
          "name" : "Submit #489672 | devs.mx OpenCart Lightning 4.43 Deserialization of Untrusted Data",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in MaxD Lightning Module 4.43 on OpenCart. This issue affects some unknown processing. The manipulation of the argument li_op/md leads to deserialization. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-03T02:15Z",
    "lastModifiedDate" : "2025-02-03T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0975",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-150"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7183467",
          "name" : "https://www.ibm.com/support/pages/node/7183467",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD console could allow an authenticated user to execute code due to improper neutralization of escape characters."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
          "versionStartIncluding" : "9.3.0.0",
          "versionEndIncluding" : "9.3.0.27",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:lts:*:*:*",
          "versionStartIncluding" : "9.4.0.0",
          "versionEndIncluding" : "9.4.0.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq_appliance:*:*:*:*:continuous_delivery:*:*:*",
          "versionStartIncluding" : "9.3.0",
          "versionEndIncluding" : "9.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T03:15Z",
    "lastModifiedDate" : "2025-07-03T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0981",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7245",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7245",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to hijack a user's session by exploiting a Stored Cross Site Scripting (XSS) vulnerability in the Group Editor page. This allows admin users to inject malicious JavaScript in the description field, which captures the session cookie of authenticated users. The cookie can then be sent to an external server, enabling session hijacking. It can also lead to information disclosure, as exposed session cookies can be used to impersonate users and gain unauthorised access to sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-18T10:15Z",
    "lastModifiedDate" : "2025-02-21T15:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0982",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-829"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cloud.google.com/application-integration/docs/release-notes#January_23_2025",
          "name" : "https://cloud.google.com/application-integration/docs/release-notes#January_23_2025",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sandbox escape in the JavaScript Task feature of Google Cloud Application Integration allows an actor to execute arbitrary unsandboxed code via crafted JavaScript code executed by the Rhino engine. Effective January 24, 2025, Application Integration will no longer support Rhino as the JavaScript execution engine. No further fix actions are needed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:application_integration:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2025-01-23",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 10.0,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-02-06T12:15Z",
    "lastModifiedDate" : "2025-07-30T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0984",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://netoloji.com/yazilim-surum-notlari/",
          "name" : "https://netoloji.com/yazilim-surum-notlari/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0102",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0102",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unrestricted Upload of File with Dangerous Type, Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Netoloji Software E-Flow allows Accessing Functionality Not Properly Constrained by ACLs, Stored XSS, File Content Injection.This issue affects E-Flow: before 3.23.00."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:H/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "LOW",
          "baseScore" : 8.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 5.3
      }
    },
    "publishedDate" : "2025-05-06T12:15Z",
    "lastModifiedDate" : "2025-05-06T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0985",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-526"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7184453",
          "name" : "https://www.ibm.com/support/pages/node/7184453",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM MQ 9.3 LTS, 9.3 CD, 9.4 LTS, and 9.4 CD \n\nstores potentially sensitive information in environment variables that could be obtained by a local user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq:9.3.0:*:*:*:lts:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq:9.3.0:*:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq:9.4.0:*:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:mq:9.4.0:*:*:*:lts:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-28T17:15Z",
    "lastModifiedDate" : "2025-06-20T15:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0986",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-409"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7229349",
          "name" : "https://www.ibm.com/support/pages/node/7229349",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM PowerVM Hypervisor FW1050.00 through FW1050.30 and FW1060.00 through FW1060.20 could allow a local user, under certain Linux processor combability mode configurations, to cause undetected data loss or errors when performing gzip compression using HW acceleration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "fw1050.00",
            "versionEndIncluding" : "fw1050.30",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:ibm:powervm_hypervisor:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "fw1060.00",
            "versionEndIncluding" : "fw1060.20",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:ibm:powervm_hypervisor:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-28T14:15Z",
    "lastModifiedDate" : "2025-08-18T19:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0989",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2024-12315. Reason: This candidate is a reservation duplicate of CVE-2024-12315. Notes: All CVE users should reference CVE-2024-12315 instead of this candidate. All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T21:15Z",
    "lastModifiedDate" : "2025-02-11T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0990",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/gloria-assistant-by-webtronic-labs/",
          "name" : "https://wordpress.org/plugins/gloria-assistant-by-webtronic-labs/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/33fd44dc-b4f8-4429-8dcd-5161602bb318?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/33fd44dc-b4f8-4429-8dcd-5161602bb318?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The I Am Gloria plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.1.4. This is due to missing or incorrect nonce validation on the iamgloria23_gloria_settings_page function. This makes it possible for unauthenticated attackers to reset the tenant ID via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-05T09:15Z",
    "lastModifiedDate" : "2025-03-05T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0993",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/516927",
          "name" : "GitLab Issue #516927",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2967771",
          "name" : "HackerOne Bug Bounty Report #2967771",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. This could allow an authenticated attacker to cause a denial of service condition by exhausting server resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-22T15:16Z",
    "lastModifiedDate" : "2025-05-29T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0994",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?",
          "name" : "https://learn.assetlifecycle.trimble.com/i/1532182-cityworks-customer-communication-2025-02-05-docx/0?",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-037-04",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Trimble Cityworks versions prior to 15.8.9 and Cityworks with office companion versions prior to 23.10 are vulnerable to a deserialization vulnerability. This could allow an authenticated user to perform a remote code execution attack against a customer’s Microsoft Internet Information Services (IIS) web server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:trimble:cityworks:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "23.0",
          "versionEndExcluding" : "23.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:trimble:cityworks:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "15.8.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-06T16:15Z",
    "lastModifiedDate" : "2025-02-12T19:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0995",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/391907159",
          "name" : "https://issues.chromium.org/issues/391907159",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in V8 in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.69943.98",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-15T02:15Z",
    "lastModifiedDate" : "2025-04-10T13:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0996",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1007"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/391788835",
          "name" : "https://issues.chromium.org/issues/391788835",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Browser UI in Google Chrome on Android prior to 133.0.6943.98 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.98",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-15T02:15Z",
    "lastModifiedDate" : "2025-04-10T13:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0997",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_12.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/391666328",
          "name" : "https://issues.chromium.org/issues/391666328",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Navigation in Google Chrome prior to 133.0.6943.98 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.98",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-15T02:15Z",
    "lastModifiedDate" : "2025-04-07T19:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0998",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Not exploitable"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-15T02:15Z",
    "lastModifiedDate" : "2025-04-04T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-0999",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/394350433",
          "name" : "https://issues.chromium.org/issues/394350433",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap buffer overflow in V8 in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.126",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T17:15Z",
    "lastModifiedDate" : "2025-04-07T19:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1000",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232528",
          "name" : "https://www.ibm.com/support/pages/node/7232528",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 \n\ncould allow an authenticated user to cause a denial of service when connecting to a z/OS database due to improper handling of automatic client rerouting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "11.5",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "11.5",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "11.5",
          "versionEndIncluding" : "11.5.9",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-05T21:15Z",
    "lastModifiedDate" : "2025-05-13T19:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1001",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-051-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-051-01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe",
          "name" : "https://www.radiantviewer.com/files/RadiAnt-2025.1-Setup.exe",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Medixant RadiAnt DICOM Viewer is vulnerable due to failure of the update mechanism to verify the update server's certificate which could allow an attacker to alter network traffic and carry out a machine-in-the-middle attack (MITM). An attacker could modify the server's response and deliver a malicious update to the user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-21T01:15Z",
    "lastModifiedDate" : "2025-02-21T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1002",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-037-01",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MicroDicom DICOM Viewer version 2024.03\n\nfails to adequately verify the update server's certificate, which could make it possible for attackers in a privileged network position to alter network traffic and carry out a machine-in-the-middle (MITM) attack. This allows the attackers to modify the server's response and deliver a malicious update to the user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:microdicom:dicom_viewer:2024.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-10T21:15Z",
    "lastModifiedDate" : "2025-03-03T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1003",
        "ASSIGNER" : "hp-security-alert@hp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hp.com/us-en/document/ish_11920613-11920636-16",
          "name" : "https://support.hp.com/us-en/document/ish_11920613-11920636-16",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A potential vulnerability has been identified in HP Anyware Agent for Linux which might allow for authentication bypass which may result in escalation of privilege. HP is releasing a software update to mitigate this potential vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T00:15Z",
    "lastModifiedDate" : "2025-02-04T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1004",
        "ASSIGNER" : "hp-security-alert@hp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hp.com/au-en/document/ish_11927586-11927615-16/hpsbpi03998",
          "name" : "https://support.hp.com/au-en/document/ish_11927586-11927615-16/hpsbpi03998",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Certain HP LaserJet Pro printers may potentially\nexperience a denial of service when a user sends a raw JPEG file to the printer\nvia IPP (Internet Printing Protocol)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T21:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1005",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/modules/layout-manager/assets/js/ekit-layout-library.js",
          "name" : "https://plugins.trac.wordpress.org/browser/elementskit-lite/trunk/modules/layout-manager/assets/js/ekit-layout-library.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?old_path=%2Felementskit-lite&old=3230214&new_path=%2Felementskit-lite&new=3237243&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?old_path=%2Felementskit-lite&old=3230214&new_path=%2Felementskit-lite&new=3237243&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/elementskit-lite/#developers",
          "name" : "https://wordpress.org/plugins/elementskit-lite/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b74d6aa-ad59-42be-b454-9c27428cab01?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5b74d6aa-ad59-42be-b454-9c27428cab01?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ElementsKit Elementor addons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Image Accordion widget in all versions up to, and including, 3.4.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmet:elementskit_elementor_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.4.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-15T10:15Z",
    "lastModifiedDate" : "2025-02-24T12:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1006",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/390590778",
          "name" : "https://issues.chromium.org/issues/390590778",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Network in Google Chrome prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted web app. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.126",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T17:15Z",
    "lastModifiedDate" : "2025-04-07T19:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1007",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/eclipse/openvsx/security/advisories/GHSA-wc7c-xq2f-qp4h",
          "name" : "https://github.com/eclipse/openvsx/security/advisories/GHSA-wc7c-xq2f-qp4h",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In OpenVSX version v0.9.0 to v0.20.0, the \n/user/namespace/{namespace}/details API allows a user to edit all \nnamespace details, even if the user is not a namespace Owner or \nContributor. The details include: name, description, website, support \nlink and social media links. The same issues existed in \n/user/namespace/{namespace}/details/logo and allowed a user to change \nthe logo."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:open_vsx:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.9.0",
          "versionEndExcluding" : "0.19.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-19T09:15Z",
    "lastModifiedDate" : "2025-07-31T12:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1008",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/recently-purchased-products-for-woo/tags/1.1.3/includes/class-rppw-public.php#L160",
          "name" : "https://plugins.trac.wordpress.org/browser/recently-purchased-products-for-woo/tags/1.1.3/includes/class-rppw-public.php#L160",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/recently-purchased-products-for-woo/#developers",
          "name" : "https://wordpress.org/plugins/recently-purchased-products-for-woo/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9ebcd32-90c1-419c-a67c-6fe41ee9fab1?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9ebcd32-90c1-419c-a67c-6fe41ee9fab1?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Recently Purchased Products For Woo plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘view’ parameter in all versions up to, and including, 1.1.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-05T09:15Z",
    "lastModifiedDate" : "2025-03-05T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1009",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1936613",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1936613",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker could have caused a use-after-free via crafted XSLT data, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.1.0",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T19:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1010",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1936982",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1936982",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker could have caused a use-after-free via the Custom Highlight API, leading to a potentially exploitable crash. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.1.0",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T19:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1011",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1936454",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1936454",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A bug in WebAssembly code generation could have lead to a crash. It may have been possible for an attacker to leverage this to achieve code execution. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T19:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1012",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1939710",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1939710",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A race during concurrent delazification could have led to a use-after-free. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.1.0",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T19:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1013",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1932555",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1932555",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A race condition could have led to private browsing tabs being opened in normal browsing windows. This could have resulted in a potential privacy leak. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-04-08T12:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1014",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940804",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940804",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Certificate length was not properly checked when added to a certificate store. In practice only trusted data was processed. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1015",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1939458",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1939458",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Thunderbird Address Book URI fields contained unsanitized links. This could be used by an attacker to create and export an address book containing a malicious payload in a field. For example, in the “Other” field of the Instant Messaging section. If another user imported the address book, clicking on the link could result in opening a web page inside Thunderbird, and that page could execute (unprivileged) JavaScript. This vulnerability affects Thunderbird < 128.7 and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-03-10T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1016",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1936601%2C1936844%2C1937694%2C1938469%2C1939583%2C1940994",
          "name" : "Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, Thunderbird 115.20, and Thunderbird 128.7",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-08/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 115.19, Firefox ESR 128.6, Thunderbird 115.19, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 115.20, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.1.0",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1017",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1926256%2C1935984%2C1935471",
          "name" : "Memory safety bugs fixed in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-09/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-10/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 134, Thunderbird 134, Firefox ESR 128.6, and Thunderbird 128.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135, Firefox ESR < 128.7, Thunderbird < 128.7, and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "128.0.1",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1018",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1021"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1910818",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1910818",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The fullscreen notification is prematurely hidden when fullscreen is re-requested quickly by the user. This could have been leveraged to perform a potential spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T19:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1019",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1021"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940162",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940162",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The z-order of the browser windows could be manipulated to hide the fullscreen notification. This could potentially be leveraged to perform a spoofing attack. This vulnerability affects Firefox < 135 and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T19:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1020",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1939063%2C1942169",
          "name" : "Memory safety bugs fixed in Firefox 135 and Thunderbird 135",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-07/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-11/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 134 and Thunderbird 134. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135 and Thunderbird < 135."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "131.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-04T14:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1021",
        "ASSIGNER" : "security@synology.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.synology.com/en-global/security/advisory/Synology_SA_25_03",
          "name" : "Synology-SA-25:03 DSM",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing authorization vulnerability in synocopy in Synology DiskStation Manager (DSM) before 7.1.1-42962-8, 7.2.1-69057-7 and 7.2.2-72806-3 allows remote attackers to read arbitrary files via unspecified vectors."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T03:15Z",
    "lastModifiedDate" : "2025-04-23T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1022",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341",
          "name" : "https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341",
          "name" : "https://gist.github.com/mrdgef/a820837c530e09e1dd725e013e0d4341",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/spatie/browsershot/commit/bcfd608b264fab654bf78e199bdfbb03e9323eb7",
          "name" : "https://github.com/spatie/browsershot/commit/bcfd608b264fab654bf78e199bdfbb03e9323eb7",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4b8dfbf72",
          "name" : "https://github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4b8dfbf72",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747",
          "name" : "https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8496747",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation in the setHtml function, invoked by Browsershot::html(), which can be bypassed by omitting the slashes in the file URI (e.g., file:../../../../etc/passwd). This is due to missing validations of the user input that should be blocking file URI schemes (e.g., file:// and file:/) in the HTML content."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T05:15Z",
    "lastModifiedDate" : "2025-02-05T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1023",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7246",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7246",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a time-based blind SQL Injection vulnerability in the EditEventTypes functionality. The newCountName parameter is directly concatenated into an SQL query without proper sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-18T10:15Z",
    "lastModifiedDate" : "2025-02-21T15:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1024",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7250",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7250",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in ChurchCRM 5.13.0 that allows an attacker to execute arbitrary JavaScript in a victim's browser via Reflected Cross-Site Scripting (XSS) in the EditEventAttendees.php page. This requires Administration privileges and affects the EID parameter. The flaw allows an attacker to steal session cookies, perform actions on behalf of an authenticated user, and gain unauthorized access to the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-19T09:15Z",
    "lastModifiedDate" : "2025-02-25T21:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1025",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/CHOOCS/fe1227443544d5d74c33982814f290af",
          "name" : "https://gist.github.com/CHOOCS/fe1227443544d5d74c33982814f290af",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/CHOOCS/fe1227443544d5d74c33982814f290af",
          "name" : "https://gist.github.com/CHOOCS/fe1227443544d5d74c33982814f290af",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Cockpit-HQ/Cockpit/commit/984ef9ad270357b843af63c81db95178eae42cae",
          "name" : "https://github.com/Cockpit-HQ/Cockpit/commit/984ef9ad270357b843af63c81db95178eae42cae",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Cockpit-HQ/Cockpit/commit/becca806c7071ecc732521bb5ad0bb9c64299592",
          "name" : "https://github.com/Cockpit-HQ/Cockpit/commit/becca806c7071ecc732521bb5ad0bb9c64299592",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-PHP-COCKPITHQCOCKPIT-8516320",
          "name" : "https://security.snyk.io/vuln/SNYK-PHP-COCKPITHQCOCKPIT-8516320",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package cockpit-hq/cockpit before 2.4.1 are vulnerable to Arbitrary File Upload where an attacker can use different extension to bypass the upload filter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T05:15Z",
    "lastModifiedDate" : "2025-02-05T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1026",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/chuajianshen/6291920112fcf1543fa7b43862112be6",
          "name" : "https://gist.github.com/chuajianshen/6291920112fcf1543fa7b43862112be6",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/mrdgef/54a8783408220c67c1b859df38a52d65",
          "name" : "https://gist.github.com/mrdgef/54a8783408220c67c1b859df38a52d65",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4b8dfbf72",
          "name" : "https://github.com/spatie/browsershot/commit/e3273974506865a24fbb5b65b534d8d4b8dfbf72",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/spatie/browsershot/pull/908",
          "name" : "https://github.com/spatie/browsershot/pull/908",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533024",
          "name" : "https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533024",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package spatie/browsershot before 5.0.5 are vulnerable to Improper Input Validation due to improper URL validation through the setUrl method, which results in a Local File Inclusion allowing the attacker to read sensitive files.\r\r**Note:**\r\rThis is a bypass of the fix for [CVE-2024-21549](https://security.snyk.io/vuln/SNYK-PHP-SPATIEBROWSERSHOT-8533023)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T05:15Z",
    "lastModifiedDate" : "2025-02-05T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1028",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?old_path=/contact-manager/tags/8.6.4&new_path=/contact-manager/tags/8.6.5&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?old_path=/contact-manager/tags/8.6.4&new_path=/contact-manager/tags/8.6.5&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6f51a8e-4a59-4b64-b0c6-2ce3933a1df5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b6f51a8e-4a59-4b64-b0c6-2ce3933a1df5?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Contact Manager plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the contact form upload feature in all versions up to, and including, 8.6.4. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible in specific configurations where the first extension is processed over the final. This vulnerability also requires successfully exploiting a race condition in order to exploit."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-05T04:15Z",
    "lastModifiedDate" : "2025-02-05T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1033",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/cbb63e80-92aa-4e85-9d47-dc68211af97d/",
          "name" : "https://wpscan.com/vulnerability/cbb63e80-92aa-4e85-9d47-dc68211af97d/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/cbb63e80-92aa-4e85-9d47-dc68211af97d/",
          "name" : "https://wpscan.com/vulnerability/cbb63e80-92aa-4e85-9d47-dc68211af97d/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Badgearoo WordPress plugin through 1.0.14 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:danielpowney:badgearoo:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.0.14",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-06-12T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1035",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.klogserver.com/surum-notlari/3-1-1/",
          "name" : "https://www.klogserver.com/surum-notlari/3-1-1/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0037",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0037",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Komtera Technolgies KLog Server allows Manipulating Web Input to File System Calls.This issue affects KLog Server: before 3.1.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-18T12:15Z",
    "lastModifiedDate" : "2025-02-18T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1039",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3237538/lenix-elementor-leads-addon",
          "name" : "https://plugins.trac.wordpress.org/changeset/3237538/lenix-elementor-leads-addon",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/0d1abaf9-4044-4dcc-95df-73f23a8a5a9f/",
          "name" : "https://wpscan.com/vulnerability/0d1abaf9-4044-4dcc-95df-73f23a8a5a9f/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/29f835c8-769a-47c0-832f-622860b1c59c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/29f835c8-769a-47c0-832f-622860b1c59c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Lenix Elementor Leads addon plugin for WordPress is vulnerable to Stored Cross-Site Scripting via a URL form field in all versions up to, and including, 1.8.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmaspik:lenix_leads_collector:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-20T13:15Z",
    "lastModifiedDate" : "2025-07-07T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1040",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/significant-gravitas/autogpt/commit/6dba31e0215549604bdcc1aed24e3a1714e75ee2",
          "name" : "https://github.com/significant-gravitas/autogpt/commit/6dba31e0215549604bdcc1aed24e3a1714e75ee2",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/b74ef75f-61d5-4422-ab15-9550c8b4f185",
          "name" : "https://huntr.com/bounties/b74ef75f-61d5-4422-ab15-9550c8b4f185",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://huntr.com/bounties/b74ef75f-61d5-4422-ab15-9550c8b4f185",
          "name" : "https://huntr.com/bounties/b74ef75f-61d5-4422-ab15-9550c8b4f185",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "AutoGPT versions 0.3.4 and earlier are vulnerable to a Server-Side Template Injection (SSTI) that could lead to Remote Code Execution (RCE). The vulnerability arises from the improper handling of user-supplied format strings in the `AgentOutputBlock` implementation, where malicious input is passed to the Jinja2 templating engine without adequate security measures. Attackers can exploit this flaw to execute arbitrary commands on the host system. The issue is fixed in version 0.4.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:agpt:autogpt_platform:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-08-05T17:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1041",
        "ASSIGNER" : "securityalerts@avaya.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.avaya.com/css/public/documents/101093084",
          "name" : "https://support.avaya.com/css/public/documents/101093084",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper input validation discovered in \n\nAvaya Call Management System\ncould allow an unauthorized \n\nremote command via a specially crafted web request. Affected versions include 18.x, 19.x prior to 19.2.0.7, and 20.x prior to 20.0.1.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:avaya:call_management_system:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "18.0.0.1",
          "versionEndExcluding" : "19.2.0.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:avaya:call_management_system:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "20.0",
          "versionEndExcluding" : "20.0.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-10T06:15Z",
    "lastModifiedDate" : "2025-07-30T17:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1042",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-552"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/50849943",
          "name" : "GitLab Issue #50849943",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2886976",
          "name" : "HackerOne Bug Bounty Report #2886976",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An insecure direct object reference vulnerability in GitLab EE affecting all versions from 15.7 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to view repositories in an unauthorized way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "15.7.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T15:15Z",
    "lastModifiedDate" : "2025-08-06T18:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1043",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3242370/embed-any-document",
          "name" : "https://plugins.trac.wordpress.org/changeset/3242370/embed-any-document",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f8c600-d62d-4f27-ba73-1a77a63859bc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b9f8c600-d62d-4f27-ba73-1a77a63859bc?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Embed Any Document – Embed PDF, Word, PowerPoint and Excel Files plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.7.5 via the 'embeddoc' shortcode. This makes it possible for authenticated attackers, with Contributor-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-20T12:15Z",
    "lastModifiedDate" : "2025-02-20T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1044",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.logsign.net/hc/en-us/articles/22076844908946-18-10-2024-Version-6-4-32-Release-Notes",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-085/",
          "name" : "ZDI-25-085",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Logsign Unified SecOps Platform Authentication Bypass Vulnerability. This vulnerability allows remote attackers to bypass authentication on affected installations of Logsign Unified SecOps Platform. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the web service, which listens on TCP port 443 by default. The issue results from the lack of proper implementation of the authentication algorithm. An attacker can leverage this vulnerability to bypass authentication on the system. Was ZDI-CAN-25336."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:logsign:unified_secops_platform:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "6.4.32",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-18T21:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1045",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.keyshot.com/cert/ksa-113962/ksa-113962.pdf?version=1.0&_gl=1*1x6i3a*_gcl_au*MTU0ODMwNDI4Ny4xNzQzNTUyMjcx",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-233/",
          "name" : "ZDI-25-233",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Luxion KeyShot Viewer KSP File Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot Viewer. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of KSP files. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24586."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-07T18:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1046",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.keyshot.com/cert/ksa-113962/ksa-113962.pdf?version=1.0&_gl=1*1x6i3a*_gcl_au*MTU0ODMwNDI4Ny4xNzQzNTUyMjcx",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-231/",
          "name" : "ZDI-25-231",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Luxion KeyShot SKP File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of SKP files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23646."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-07T18:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1047",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-824"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.keyshot.com/cert/ksa-113962/ksa-113962.pdf?version=1.0&_gl=1*1x6i3a*_gcl_au*MTU0ODMwNDI4Ny4xNzQzNTUyMjcx",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-232/",
          "name" : "ZDI-25-232",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Luxion KeyShot PVS File Parsing Access of Uninitialized Pointer Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Luxion KeyShot. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of pvs files. The issue results from the lack of proper initialization of a pointer prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-23694."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:luxion:keyshot:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2025.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-07T18:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1048",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-223/",
          "name" : "ZDI-25-223",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sonos Era 300 Speaker libsmb2 Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of SMB data. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25535."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-04-23T17:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1049",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-224/",
          "name" : "ZDI-25-224",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the processing of ID3 data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25601."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-04-23T17:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1050",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-225/",
          "name" : "ZDI-25-225",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sonos Era 300 Out-of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability. \n\nThe specific flaw exists within the processing of HLS playlist data. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated data structure. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25606."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-04-23T17:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1051",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-311/",
          "name" : "ZDI-25-311",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Sonos Era 300 Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected Sonos Era 300 speakers. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of ALAC data. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the anacapa user. Was ZDI-CAN-25865."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:sonos:era_300_firmware:81.1-58074:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:sonos:era_300:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T19:15Z",
    "lastModifiedDate" : "2025-08-15T16:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1052",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-084/",
          "name" : "ZDI-25-084",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mintty Sixel Image Parsing Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Mintty. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of sixel images. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the current user. Was ZDI-CAN-23382."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mintty_project:mintty:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.7.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T20:15Z",
    "lastModifiedDate" : "2025-02-18T21:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1053",
        "ASSIGNER" : "sirt@brocade.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25399",
          "name" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25399",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Under certain error conditions at time of SANnav installation or upgrade, the encryption key can be written into and obtained from a Brocade SANnav supportsave.  An attacker with privileged access to the Brocade SANnav database could use the encryption key to obtain passwords used by Brocade SANnav."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T04:15Z",
    "lastModifiedDate" : "2025-02-14T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1054",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3253371/uicore-elements",
          "name" : "https://plugins.trac.wordpress.org/changeset/3253371/uicore-elements",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d74e8541-9726-4bc2-9fbd-f6016490e0ea?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d74e8541-9726-4bc2-9fbd-f6016490e0ea?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The UiCore Elements – Free Elementor widgets and templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the UI Counter, UI Icon Box, UI Testimonial Slider, UI Testimonial Grid, and UI Testimonial Carousel widgets in all versions up to, and including, 1.0.16 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-23T10:15Z",
    "lastModifiedDate" : "2025-04-23T14:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1055",
        "ASSIGNER" : "cna@pentraze.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://pentraze.com/",
          "name" : "https://pentraze.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://pentraze.com/vulnerability-reports/",
          "name" : "https://pentraze.com/vulnerability-reports/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the K7RKScan.sys driver, part of the K7 Security Anti-Malware suite, allows a local low-privilege user to send crafted IOCTL requests to terminate a wide range of processes running with administrative or system-level privileges, with the exception of those inherently protected by the operating system. This flaw stems from missing access control in the driver's IOCTL handler, enabling unprivileged users to perform privileged actions in kernel space. Successful exploitation can lead to denial of service by disrupting critical services or privileged applications."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-11T00:15Z",
    "lastModifiedDate" : "2025-06-11T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1056",
        "ASSIGNER" : "product-security@axis.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.axis.com/dam/public/e4/2e/b2/cve-2025-1056pdf-en-US-479106.pdf",
          "name" : "https://www.axis.com/dam/public/e4/2e/b2/cve-2025-1056pdf-en-US-479106.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Gee-netics, member of AXIS Camera Station Pro Bug Bounty Program, has identified an issue with a specific file that the server is using. A non-admin user can modify this file to either create files or change the content of files in an admin-protected location.\nAxis has released a patched version for the highlighted flaw. Please \nrefer to the Axis security advisory for more information and solution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-23T06:15Z",
    "lastModifiedDate" : "2025-04-23T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1057",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1057",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1057",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2343894",
          "name" : "RHBZ#2343894",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Keylime, a remote attestation solution, where strict type checking introduced in version 7.12.0 prevents the registrar from reading database entries created by previous versions, for example, 7.11.0. Specifically, older versions store agent registration data as bytes, whereas the updated registrar expects str. This issue leads to an exception when processing agent registration requests, causing the agent to fail."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-15T09:15Z",
    "lastModifiedDate" : "2025-03-15T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1058",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-494"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-494: Download of Code Without Integrity Check vulnerability exists that could render the device\ninoperable when malicious firmware is downloaded."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T06:15Z",
    "lastModifiedDate" : "2025-02-13T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1059",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-770: Allocation of Resources Without Limits or Throttling vulnerability exists that could\ncause communications to stop when malicious packets are sent to the webserver of the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T06:15Z",
    "lastModifiedDate" : "2025-02-13T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1060",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-319"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-319: Cleartext Transmission of Sensitive Information vulnerability exists that could result in the exposure\nof data when network traffic is being sniffed by an attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T06:15Z",
    "lastModifiedDate" : "2025-02-13T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1061",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://nextendweb.com/nextend-social-login-docs/pro-addon-changelog/",
          "name" : "https://nextendweb.com/nextend-social-login-docs/pro-addon-changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nextendweb.com/nextend-social-login-docs/provider-apple/",
          "name" : "https://nextendweb.com/nextend-social-login-docs/provider-apple/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6494e54c-db04-41f9-8b91-6ad12528cf01?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6494e54c-db04-41f9-8b91-6ad12528cf01?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Nextend Social Login Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 3.1.16. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-07T02:15Z",
    "lastModifiedDate" : "2025-02-07T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1062",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/657b355b-e38f-46d6-b574-7ce736d25f31/",
          "name" : "https://wpscan.com/vulnerability/657b355b-e38f-46d6-b574-7ce736d25f31/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Slider, Gallery, and Carousel by MetaSlider  WordPress plugin before 3.95.0 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:metaslider:slider\\,_gallery\\,_and_carousel:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.95.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-24T06:15Z",
    "lastModifiedDate" : "2025-04-08T13:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1063",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3241883/classified-listing",
          "name" : "https://plugins.trac.wordpress.org/changeset/3241883/classified-listing",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e701b771-59f2-4783-b0a1-bea4d6c3d245?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e701b771-59f2-4783-b0a1-bea4d6c3d245?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Classified Listing – Classified ads & Business Directory Plugin plugin for WordPress is vulnerable to Sensitive Information Exposure in all versions up to, and including, 4.0.4 via the rtcl_taxonomy_settings_export function. This makes it possible for unauthenticated attackers to extract sensitive data including API keys and tokens."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:radiustheme:classified_listing:*:*:*:*:-:wordpress:*:*",
          "versionEndExcluding" : "4.0.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-25T07:15Z",
    "lastModifiedDate" : "2025-02-28T16:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1064",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3239293/easy-login-woocommerce",
          "name" : "https://plugins.trac.wordpress.org/changeset/3239293/easy-login-woocommerce",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd62a072-8619-4f51-a52f-2ada7e455cb1?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd62a072-8619-4f51-a52f-2ada7e455cb1?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Login/Signup Popup ( Inline Form + Woocommerce ) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's xoo_el_action shortcode in all versions up to, and including, 2.8.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xootix:login\\/signup_popup:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.8.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-20T09:15Z",
    "lastModifiedDate" : "2025-02-25T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1065",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3240066/visualizer",
          "name" : "https://plugins.trac.wordpress.org/changeset/3240066/visualizer",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/17c1de7b-5178-4fbe-a515-169de4323ae7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/17c1de7b-5178-4fbe-a515-169de4323ae7?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Visualizer: Tables and Charts Manager for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Import Data From File feature in all versions up to, and including, 3.11.8 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-19T06:15Z",
    "lastModifiedDate" : "2025-02-19T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1066",
        "ASSIGNER" : "cert@cert.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/thiagoralves/OpenPLC_v3/commit/d1b1a3b7e97f2b3fef0876056cf9d7879991744a",
          "name" : "https://github.com/thiagoralves/OpenPLC_v3/commit/d1b1a3b7e97f2b3fef0876056cf9d7879991744a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://medium.com/@alimuhammadsecured/cyberforce-2024-how-i-found-my-first-cve-openplcv3-16c058b114b0",
          "name" : "https://medium.com/@alimuhammadsecured/cyberforce-2024-how-i-found-my-first-cve-openplcv3-16c058b114b0",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OpenPLC_V3 contains an arbitrary file upload vulnerability, which could be leveraged for malvertising or phishing campaigns."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T00:15Z",
    "lastModifiedDate" : "2025-03-20T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1067",
        "ASSIGNER" : "psirt@esri.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-732"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities",
          "name" : "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "There is an untrusted search path vulnerability in Esri ArcGIS Pro 3.3 and 3.4 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS ArcGIS Pro, the file could execute and run malicious commands under the context of the victim. This issue is addressed in ArcGIS Pro 3.3.3 and 3.4.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_allsource:1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_allsource:1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_pro:3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_pro:3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-25T17:15Z",
    "lastModifiedDate" : "2025-06-20T19:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1068",
        "ASSIGNER" : "psirt@esri.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities",
          "name" : "https://www.esri.com/arcgis-blog/products/administration/administration/arcgis-pro-and-arcgis-allsource-patches-address-high-severity-vulnerabilities",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "There is an untrusted search path vulnerability in Esri ArcGIS AllSource 1.2 and 1.3 that may allow a low privileged attacker with write privileges to the local file system to introduce a malicious executable to the filesystem. When the victim performs a specific action using ArcGIS AllSource, the file could execute and run malicious commands under the context of the victim. This issue is corrected in ArcGIS AllSource 1.2.1 and 1.3.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_allsource:1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_allsource:1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_pro:3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esri:arcgis_pro:3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-25T17:15Z",
    "lastModifiedDate" : "2025-06-20T19:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1070",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=sevd-2025-042-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-042-01.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-434: Unrestricted Upload of File with Dangerous Type vulnerability exists that could render the device\ninoperable when a malicious file is downloaded."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T06:15Z",
    "lastModifiedDate" : "2025-02-13T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1071",
        "ASSIGNER" : "security@watchguard.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00001",
          "name" : "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00001",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the spamBlocker module. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T14:15Z",
    "lastModifiedDate" : "2025-02-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1072",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/#denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload",
          "name" : "https://about.gitlab.com/releases/2024/11/13/patch-release-gitlab-17-5-2-released/#denial-of-service-by-importing-malicious-crafted-fogbugz-import-payload",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/463093",
          "name" : "GitLab Issue #463093",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2504059",
          "name" : "HackerOne Bug Bounty Report #2504059",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all versions starting from 7.14.1 prior to 17.3.7, 17.4 prior to 17.4.4, and 17.5 prior to 17.5.2. A denial of service could occur upon importing maliciously crafted content using the Fogbugz importer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.5.0",
          "versionEndExcluding" : "17.5.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.5.0",
          "versionEndExcluding" : "17.5.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.4.0",
          "versionEndExcluding" : "17.4.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "7.14.1",
          "versionEndExcluding" : "17.3.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "7.14.1",
          "versionEndExcluding" : "17.3.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-07T04:15Z",
    "lastModifiedDate" : "2025-08-06T20:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1073",
        "ASSIGNER" : "product-security@gg.jp.panasonic.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lsin.panasonic.com/release-notes",
          "name" : "https://lsin.panasonic.com/release-notes",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Panasonic IR Control Hub (IR Blaster) versions 1.17 and earlier may allow an attacker with physical access to load unauthorized firmware onto the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-10T12:15Z",
    "lastModifiedDate" : "2025-04-10T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1074",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mano257200/qloapps-csrf-logout-vulnerability",
          "name" : "https://github.com/mano257200/qloapps-csrf-logout-vulnerability",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294834",
          "name" : "VDB-294834 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294834",
          "name" : "VDB-294834 | Webkul QloApps URL mylogout cross-site request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.491600",
          "name" : "Submit #491600 | webkul qloapps 1.6.1 Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Webkul QloApps 1.6.1. Affected is the function logout of the file /en/?mylogout of the component URL Handler. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure. They are aware about it and are working on resolving it."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-06T14:15Z",
    "lastModifiedDate" : "2025-07-02T19:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1075",
        "ASSIGNER" : "security@checkmk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://checkmk.com/werk/17495",
          "name" : "https://checkmk.com/werk/17495",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insertion of Sensitive Information into Log File in Checkmk GmbH's Checkmk versions <2.3.0p27, <2.2.0p40, and 2.1.0p51 (EOL) causes LDAP credentials to be written to Apache error log file accessible to administrators."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T10:15Z",
    "lastModifiedDate" : "2025-02-19T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1076",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-vulnerability-holded",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/stored-cross-site-scripting-vulnerability-holded",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Stored Cross-Site Scripting (Stored XSS) vulnerability has been found in the Holded application. This vulnerability could allow an attacker to store a JavaScript payload within the editable ‘name’ and ‘icon’ parameters of the Activities functionality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T14:15Z",
    "lastModifiedDate" : "2025-02-06T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1077",
        "ASSIGNER" : "incident@nbu.gov.sk"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.iblsoft.com/security/advisory-isec-2024-001/",
          "name" : "https://www.iblsoft.com/security/advisory-isec-2024-001/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security vulnerability has been identified in the IBL Software Engineering Visual Weather and derived products (NAMIS, Aero Weather, Satellite Weather). The vulnerability is present in the Product Delivery Service (PDS) component in specific server configurations where the PDS pipeline utilizes the IPDS pipeline with Message Editor Output Filters enabled.\n\nA remote unauthenticated\n\nattacker can exploit this vulnerability to send unauthenticated requests to execute the IPDS pipeline with specially crafted Form Properties, enabling remote execution of arbitrary Python code. This vulnerability could lead to a full system compromise of the affected server, particularly if Visual Weather services are run under a privileged user account—contrary to the documented installation best practices.\n\n\n\nUpgrade to the patched versions 7.3.10 (or higher), 8.6.0 (or higher)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T09:15Z",
    "lastModifiedDate" : "2025-02-07T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1078",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          }, {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294844",
          "name" : "VDB-294844 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294844",
          "name" : "VDB-294844 | AppHouseKitchen AlDente Charge Limiter XPC Service com.apphousekitchen.aldente-pro.helper shouldAcceptNewConnection improper authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.492529",
          "name" : "Submit #492529 | AppHouseKitchen AlDente - Charge Limiter < 1.30 Privilege Escalation",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://winslow1984.com/books/cve-collection/page/aldente-charge-limiter-130-unauthorized-privileged-hardware-operations",
          "name" : "https://winslow1984.com/books/cve-collection/page/aldente-charge-limiter-130-unauthorized-privileged-hardware-operations",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in AppHouseKitchen AlDente Charge Limiter up to 1.29 on macOS and classified as critical. This vulnerability affects the function shouldAcceptNewConnection of the file com.apphousekitchen.aldente-pro.helper of the component XPC Service. The manipulation leads to improper authorization. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. Upgrading to version 1.30 is able to address this issue. It is recommended to upgrade the affected component. The vendor was contacted early about this disclosure and acted very professional."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-06T17:15Z",
    "lastModifiedDate" : "2025-02-06T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1079",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-59"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://balintmagyar.com/articles/google-web-designer-symlink-client-side-rce-cve-2025-1079",
          "name" : "https://balintmagyar.com/articles/google-web-designer-symlink-client-side-rce-cve-2025-1079",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Client RCE on macOS and Linux via improper symbolic link resolution in Google Web Designer's preview feature"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:web_designer:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "16.2.0.0128",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-12T20:15Z",
    "lastModifiedDate" : "2025-07-29T13:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1080",
        "ASSIGNER" : "security@documentfoundation.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.libreoffice.org/about-us/security/advisories/cve-2025-1080",
          "name" : "https://www.libreoffice.org/about-us/security/advisories/cve-2025-1080",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice a link in a browser using that scheme could be constructed with an embedded inner URL that when passed to LibreOffice could call internal macros with arbitrary arguments.\nThis issue affects LibreOffice: from 24.8 before < 24.8.5, from 25.2 before < 25.2.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T20:15Z",
    "lastModifiedDate" : "2025-03-04T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1081",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1391"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://packetstorm.news/files/id/188799/",
          "name" : "https://packetstorm.news/files/id/188799/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294857",
          "name" : "VDB-294857 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294857",
          "name" : "VDB-294857 | Bharti Airtel Xstream Fiber WiFi Password weak credentials",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.488582",
          "name" : "Submit #488582 | Bharti Airtel Airtel Xstream Fiber WiFi N/A Brute force attack",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Bharti Airtel Xstream Fiber up to 20250123. It has been rated as problematic. This issue affects some unknown processing of the component WiFi Password Handler. The manipulation leads to use of weak credentials. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-06T21:15Z",
    "lastModifiedDate" : "2025-02-06T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1082",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/xzs-mysql/StoredXSS-ExamEdit.md",
          "name" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/xzs-mysql/StoredXSS-ExamEdit.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294858",
          "name" : "VDB-294858 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294858",
          "name" : "VDB-294858 | Mindskip xzs-mysql ????????? Exam Edit edit cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489633",
          "name" : "Submit #489633 | Mindskip xzs-mysql 3.9.0 Stored Cross Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Mindskip xzs-mysql ????????? 3.9.0. Affected is an unknown function of the file /api/admin/question/edit of the component Exam Edit Handler. The manipulation of the argument title/content leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-06T23:15Z",
    "lastModifiedDate" : "2025-02-06T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1083",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-346"
          }, {
            "lang" : "en",
            "value" : "CWE-942"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/xzs-mysql/OverlyPermissiveCORS-Multiple.md",
          "name" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/xzs-mysql/OverlyPermissiveCORS-Multiple.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294859",
          "name" : "VDB-294859 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294859",
          "name" : "VDB-294859 | Mindskip xzs-mysql ????????? CORS cross-domain policy",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489634",
          "name" : "Submit #489634 | Mindskip xzs-mysql 3.9.0 CORS Misconfiguration",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Mindskip xzs-mysql ????????? 3.9.0. Affected by this vulnerability is an unknown functionality of the component CORS Handler. The manipulation leads to permissive cross-domain policy with untrusted domains. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-06T23:15Z",
    "lastModifiedDate" : "2025-02-06T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1084",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/xzs-mysql/CrossSiteRequestForgery-Multiple.md",
          "name" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/xzs-mysql/CrossSiteRequestForgery-Multiple.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294860",
          "name" : "VDB-294860 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294860",
          "name" : "VDB-294860 | Mindskip xzs-mysql ????????? cross-site request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489644",
          "name" : "Submit #489644 | Mindskip xzs-mysql 3.9.0 Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Mindskip xzs-mysql ????????? 3.9.0. Affected by this issue is some unknown functionality. The manipulation leads to cross-site request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Multiple endpoints are affected. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-07T00:15Z",
    "lastModifiedDate" : "2025-02-07T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1085",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294861",
          "name" : "VDB-294861 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294861",
          "name" : "VDB-294861 | Animati PACS login cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489857",
          "name" : "Submit #489857 | Animati PACS v1.24.10.16.01~1.24.12.09.03 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Animati PACS up to 1.24.12.09.03. This affects an unknown part of the file /login. The manipulation of the argument p leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-07T01:15Z",
    "lastModifiedDate" : "2025-02-07T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1086",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          }, {
            "lang" : "en",
            "value" : "CWE-24"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294862",
          "name" : "VDB-294862 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294862",
          "name" : "VDB-294862 | Safetytest Cloud-Master Server static path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.491021",
          "name" : "Submit #491021 | Safetytest Cloud-Master 1.1.1 Path Traversal: 'dir/../../filename'",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Safetytest Cloud-Master Server up to 1.1.1 and classified as critical. This vulnerability affects unknown code of the file /static/. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-07T02:15Z",
    "lastModifiedDate" : "2025-02-07T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1087",
        "ASSIGNER" : "vulnerability@konghq.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Kong/insomnia",
          "name" : "https://github.com/Kong/insomnia",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Kong Insomnia Desktop Application before 11.0.2 contains a template injection vulnerability that allows attackers to execute arbitrary code. The vulnerability exists due to insufficient validation of user-supplied input when processing template strings, which can lead to arbitrary JavaScript execution in the context of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-09T12:15Z",
    "lastModifiedDate" : "2025-05-09T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1088",
        "ASSIGNER" : "security@grafana.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://grafana.com/security/security-advisories/cve-2025-1088/",
          "name" : "https://grafana.com/security/security-advisories/cve-2025-1088/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Grafana, an excessively long dashboard title or panel name will cause Chromium browsers to become unresponsive due to Improper Input Validation vulnerability in Grafana.\nThis issue affects Grafana: before 11.6.2 and is fixed in 11.6.2 and higher."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-18T10:15Z",
    "lastModifiedDate" : "2025-06-18T13:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1091",
        "ASSIGNER" : "vulnreport@tenable.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.tenable.com/security/tns-2025-01",
          "name" : "https://www.tenable.com/security/tns-2025-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Broken Authorization schema exists where any authenticated user could download IOA script and configuration files if the URL is known."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T00:15Z",
    "lastModifiedDate" : "2025-02-26T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1093",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/ai-hub-startup-technology-wordpress-theme/47473638",
          "name" : "https://themeforest.net/item/ai-hub-startup-technology-wordpress-theme/47473638",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/09adfe7e-f154-4143-827f-957ded3ffc8f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/09adfe7e-f154-4143-827f-957ded3ffc8f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AIHub theme for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the generate_image function in all versions up to, and including, 1.3.7. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-19T04:15Z",
    "lastModifiedDate" : "2025-04-21T14:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1094",
        "ASSIGNER" : "cna@postgresql.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/16/3",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/16/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/20/1",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/20/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/02/msg00015.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/02/msg00024.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/02/msg00024.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250221-0010/",
          "name" : "https://security.netapp.com/advisory/ntap-20250221-0010/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.postgresql.org/support/security/CVE-2025-1094/",
          "name" : "https://www.postgresql.org/support/security/CVE-2025-1094/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of quoting syntax in PostgreSQL libpq functions PQescapeLiteral(), PQescapeIdentifier(), PQescapeString(), and PQescapeStringConn() allows a database input provider to achieve SQL injection in certain usage patterns.  Specifically, SQL injection requires the application to use the function result to construct input to psql, the PostgreSQL interactive terminal.  Similarly, improper neutralization of quoting syntax in PostgreSQL command line utility programs allows a source of command line arguments to achieve SQL injection when client_encoding is BIG5 and server_encoding is one of EUC_TW or MULE_INTERNAL.  Versions before PostgreSQL 17.3, 16.7, 15.11, 14.16, and 13.19 are affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T13:15Z",
    "lastModifiedDate" : "2025-02-21T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1095",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7230335",
          "name" : "https://www.ibm.com/support/pages/node/7230335",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Personal Communications v14 and v15 include a Windows service that is vulnerable to local privilege escalation (LPE). The vulnerability allows any interactively logged in users on the target computer to run commands with full privileges in the context of NT AUTHORITY\\SYSTEM. This allows for a low privileged attacker to escalate their privileges. This vulnerability is due to an incomplete fix for CVE-2024-25029."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:personal_communications:14.0.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:personal_communications:15.0.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-08T16:15Z",
    "lastModifiedDate" : "2025-08-13T00:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1096",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-08T01:15Z",
    "lastModifiedDate" : "2025-02-08T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1097",
        "ASSIGNER" : "security@kubernetes.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kubernetes/kubernetes/issues/131007",
          "name" : "https://github.com/kubernetes/kubernetes/issues/131007",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue was discovered in  ingress-nginx https://github.com/kubernetes/ingress-nginx  where the `auth-tls-match-cn` Ingress annotation can be used to inject configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T00:15Z",
    "lastModifiedDate" : "2025-03-25T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1098",
        "ASSIGNER" : "security@kubernetes.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kubernetes/kubernetes/issues/131008",
          "name" : "https://github.com/kubernetes/kubernetes/issues/131008",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue was discovered in  ingress-nginx https://github.com/kubernetes/ingress-nginx  where the `mirror-target` and `mirror-host` Ingress annotations can be used to inject arbitrary configuration into nginx. This can lead to arbitrary code execution in the context of the ingress-nginx controller, and disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T00:15Z",
    "lastModifiedDate" : "2025-03-25T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1099",
        "ASSIGNER" : "vdisclose@cert-in.org.in"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0017",
          "name" : "https://www.cert-in.org.in/s2cMainServlet?pageid=PUBVLNOTES01&VLCODE=CIVN-2025-0017",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This vulnerability exists in Tapo C500 Wi-Fi camera due to hard-coded RSA private key embedded within the device firmware. An attacker with physical access could exploit this vulnerability to obtain cryptographic private keys which can then be used to perform impersonation, data decryption and man in the middle attacks on the targeted device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-10T11:15Z",
    "lastModifiedDate" : "2025-02-14T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1100",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-259"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1100",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1100",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A CWE-259 \"Use of Hard-coded Password\" for the root account in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to execute arbitrary code with root privileges via SSH."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T14:15Z",
    "lastModifiedDate" : "2025-02-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1101",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-204"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1101",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1101",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A CWE-204 \"Observable Response Discrepancy\" in the login page in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to enumerate valid usernames via crafted HTTP requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T14:15Z",
    "lastModifiedDate" : "2025-02-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1102",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-346"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1102",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1102",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A CWE-346 \"Origin Validation Error\" in the CORS configuration in Q-Free MaxTime less than or equal to version 2.11.0 allows an unauthenticated remote attacker to affect the device confidentiality, integrity, or availability via crafted URLs or HTTP requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T14:15Z",
    "lastModifiedDate" : "2025-02-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1103",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9",
          "name" : "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9?pvs=73",
          "name" : "https://tasty-foxtrot-3a8.notion.site/D-link-DIR-823X-set_wifi_blacklists-Vulnerability-1870448e619580e5bf09cf628692f7a9?pvs=73",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294933",
          "name" : "VDB-294933 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294933",
          "name" : "VDB-294933 | D-Link DIR-823X HTTP POST Request set_wifi_blacklists null pointer dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.489603",
          "name" : "Submit #489603 | D-Link DIR-823X 240126?240802  NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in D-Link DIR-823X 240126/240802. This affects the function set_wifi_blacklists of the file /goform/set_wifi_blacklists of the component HTTP POST Request Handler. The manipulation of the argument macList leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-823x_firmware:240126:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-823x_firmware:240802:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dir-823x:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-07T15:15Z",
    "lastModifiedDate" : "2025-05-21T16:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1104",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-290"
          }, {
            "lang" : "en",
            "value" : "CWE-287"
          }, {
            "lang" : "en",
            "value" : "CWE-290"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kn1g78/cve/blob/main/dlink.md",
          "name" : "https://github.com/kn1g78/cve/blob/main/dlink.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/kn1g78/cve/blob/main/dlink.md",
          "name" : "https://github.com/kn1g78/cve/blob/main/dlink.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294934",
          "name" : "VDB-294934 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294934",
          "name" : "VDB-294934 | D-Link DHP-W310AV authentication spoofing",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.489958",
          "name" : "Submit #489958 | D-Link DHP-W310AV 1.04 Exposure of Sensitive System Information to an Unauthorized Cont",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in D-Link DHP-W310AV 1.04 and classified as critical. This vulnerability affects unknown code. The manipulation leads to authentication bypass by spoofing. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dhp-w310av_firmware:1.04:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dhp-w310av:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-07T17:15Z",
    "lastModifiedDate" : "2025-05-21T16:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1105",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.294938",
          "name" : "VDB-294938 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.294938",
          "name" : "VDB-294938 | SiberianCMS HTTP GET Request flat cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.491207",
          "name" : "Submit #491207 | Siberian Siberian CMS 4.20.6 Reflected Cross-Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SiberianCMS 4.20.6. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /app/sae/design/desktop/flat of the component HTTP GET Request Handler. The manipulation leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-07T18:15Z",
    "lastModifiedDate" : "2025-02-07T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1106",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasyPathTraversal-2.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasyPathTraversal-2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.294939",
          "name" : "VDB-294939 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.294939",
          "name" : "VDB-294939 | CmsEasy database_admin.php restore_action path traversal",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.491518",
          "name" : "Submit #491518 | ?????????????????? SiPing Shi JiuZhou Yitong KeJi YouXianGongSi  CmsEasy V7.7.7.9 Path Traversal",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in CmsEasy 7.7.7.9. This affects the function deletedir_action/restore_action in the library lib/admin/database_admin.php. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-07T19:15Z",
    "lastModifiedDate" : "2025-03-04T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1107",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-620"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unverified password change vulnerability in Janto, versions prior to r12. This could allow an unauthenticated attacker to change another user's password without knowing their current password. To exploit the vulnerability, the attacker must create a specific POST request and send it to the endpoint ‘/public/cgi/Gateway.php’."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T14:15Z",
    "lastModifiedDate" : "2025-02-07T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1108",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-345"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-janto",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient data authenticity verification vulnerability in Janto, versions prior to r12. This allows an unauthenticated attacker to modify the content of emails sent to reset the password. To exploit the vulnerability, the attacker must create a POST request by injecting malicious content into the ‘Xml’ parameter on the ‘/public/cgi/Gateway.php’ endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T14:15Z",
    "lastModifiedDate" : "2025-02-07T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1110",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          }, {
            "lang" : "en",
            "value" : "CWE-1220"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/517693",
          "name" : "GitLab Issue #517693",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2972576",
          "name" : "HackerOne Bug Bounty Report #2972576",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 18.0 before 18.0.1. In certain circumstances, a user with limited permissions could access Job Data via a crafted GraphQL query."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-22T14:16Z",
    "lastModifiedDate" : "2025-05-29T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1112",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-282"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7239151",
          "name" : "https://www.ibm.com/support/pages/node/7239151",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM OpenPages with Watson 8.3 and 9.0 could allow an authenticated user to obtain sensitive information that should only be available to privileged users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "8.3",
            "versionEndExcluding" : "8.3.0.3.2",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:openpages_with_watson:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "9.0",
            "versionEndExcluding" : "9.0.0.5.3",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-09T15:15Z",
    "lastModifiedDate" : "2025-07-14T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1113",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J",
          "name" : "https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J",
          "name" : "https://gitee.com/taisan/tarzan-cms/issues/IBHZ0J",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295019",
          "name" : "VDB-295019 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295019",
          "name" : "VDB-295019 | taisan tarzan-cms Add Theme admin#themes upload deserialization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in taisan tarzan-cms up to 1.0.0. It has been rated as critical. This issue affects the function upload of the file /admin#themes of the component Add Theme Handler. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-07T22:15Z",
    "lastModifiedDate" : "2025-02-07T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1114",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/newbee-ltd/newbee-mall/issues/94",
          "name" : "https://github.com/newbee-ltd/newbee-mall/issues/94",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/newbee-ltd/newbee-mall/issues/94",
          "name" : "https://github.com/newbee-ltd/newbee-mall/issues/94",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/newbee-ltd/newbee-mall/issues/94#issue-2811680280",
          "name" : "https://github.com/newbee-ltd/newbee-mall/issues/94#issue-2811680280",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295020",
          "name" : "VDB-295020 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295020",
          "name" : "VDB-295020 | newbee-mall Add Category Page save cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.489744",
          "name" : "Submit #489744 | https://github.com/newbee-ltd/newbee-mall newbee-mall 1.0 Stored XSS",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in newbee-mall 1.0. Affected is the function save of the file /admin/categories/save of the component Add Category Page. The manipulation of the argument categoryName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. This product is using a rolling release to provide continious delivery. Therefore, no version details for affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:newbee-mall_project:newbee-mall:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-07T23:15Z",
    "lastModifiedDate" : "2025-06-20T17:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1115",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/RT-Thread/rt-thread/issues/9877",
          "name" : "https://github.com/RT-Thread/rt-thread/issues/9877",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295021",
          "name" : "VDB-295021 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295021",
          "name" : "VDB-295021 | RT-Thread lwp_syscall.c sys_timer_settime information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.489903",
          "name" : "Submit #489903 | RT-Thread v5.1.0 Improper Handling of Parameters",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_device_close/sys_device_control/sys_device_find/sys_device_init/sys_device_open/sys_device_read/sys_device_register/sys_device_write/sys_event_delete/sys_event_recv/sys_event_send/sys_mb_delete/sys_mb_recv/sys_mb_send/sys_mb_send_wait/sys_mq_recv/sys_mq_send/sys_mq_urgent/sys_mutex_delete/sys_mutex_release/sys_mutex_take/sys_rt_timer_control/sys_rt_timer_delete/sys_rt_timer_start/sys_rt_timer_stop/sys_sem_delete/sys_sem_release/sys_sem_take/sys_shmat/sys_shmdt/sys_thread_create/sys_thread_delete/sys_thread_startup/sys_timer_delete/sys_timer_gettime/sys_timer_settime of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-08T10:15Z",
    "lastModifiedDate" : "2025-02-16T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1116",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/d6a41cfebd9e10e63a8c698d3a8ad771",
          "name" : "https://gist.github.com/mcdruid/d6a41cfebd9e10e63a8c698d3a8ad771",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295022",
          "name" : "VDB-295022 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295022",
          "name" : "VDB-295022 | Dreamvention Live AJAX Search Free live_search.searchresults search sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.492051",
          "name" : "Submit #492051 | Dreamvention Live Ajax Search OpenCart module <= 1.0.6 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Dreamvention Live AJAX Search Free up to 1.0.6 on OpenCart. Affected by this issue is the function searchresults/search of the file /?route=extension/live_search/module/live_search.searchresults. The manipulation of the argument keyword leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-08T12:15Z",
    "lastModifiedDate" : "2025-02-08T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1117",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/d4bdd8ffb8988bce9408c6bac40a15c5",
          "name" : "https://gist.github.com/mcdruid/d4bdd8ffb8988bce9408c6bac40a15c5",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/CoinRemitter/opencart/releases/tag/0.0.3",
          "name" : "https://github.com/CoinRemitter/opencart/releases/tag/0.0.3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295023",
          "name" : "VDB-295023 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295023",
          "name" : "VDB-295023 | CoinRemitter sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.492685",
          "name" : "Submit #492685 | CoinRemitter CoinRemitter Plugin For Opencart 0.0.2 / version 4.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in CoinRemitter 0.0.1/0.0.2 on OpenCart. This affects an unknown part. The manipulation of the argument coin leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 0.0.3 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-08T13:15Z",
    "lastModifiedDate" : "2025-02-08T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1118",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1118",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1118",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346137",
          "name" : "RHBZ#2346137",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in grub2. Grub's dump command is not blocked when grub is in lockdown mode, which allows the user to read any memory information, and an attacker may leverage this in order to extract signatures, salts, and other sensitive information from the memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T18:15Z",
    "lastModifiedDate" : "2025-02-19T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1119",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250719/simply-schedule-appointments/trunk/booking-app-new/page-appointment-edit.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250719/simply-schedule-appointments/trunk/booking-app-new/page-appointment-edit.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1be557db-daa8-4d86-819a-462f29da884b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1be557db-daa8-4d86-819a-462f29da884b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Appointment Booking Calendar — Simply Schedule Appointments Booking Plugin plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.6.8.5. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-13T07:15Z",
    "lastModifiedDate" : "2025-03-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1121",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/336153054",
          "name" : "https://issues.chromium.org/issues/b/336153054",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory", "Broken Link" ]
        }, {
          "url" : "https://issuetracker.google.com/issues/336153054",
          "name" : "https://issuetracker.google.com/issues/336153054",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://issuetracker.google.com/issues/336153054",
          "name" : "https://issuetracker.google.com/issues/336153054",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Privilege escalation in Installer and Recovery image handling in Google ChromeOS version 15786.48.2 on device allows an attacker with physical access to gain root code \nexecution and potentially unenroll enterprise-managed devices via a specially crafted recovery image."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:google:chrome_os:15786.48.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-07T00:15Z",
    "lastModifiedDate" : "2025-07-21T16:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1122",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/324336238",
          "name" : "https://issues.chromium.org/issues/b/324336238",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://issuetracker.google.com/issues/324336238",
          "name" : "https://issuetracker.google.com/issues/324336238",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 15753.50.0  stable on Cr50 Boards allows an attacker with root access to gain persistence and \nBypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-15T20:15Z",
    "lastModifiedDate" : "2025-05-06T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1123",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3283671/wp-smtp",
          "name" : "https://plugins.trac.wordpress.org/changeset/3283671/wp-smtp",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f99a918d-53c1-46bd-8e55-9ba77a92efe8?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f99a918d-53c1-46bd-8e55-9ba77a92efe8?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Solid Mail – SMTP email and logging made by SolidWP plugin for WordPress is vulnerable to Stored Cross-Site Scripting via email Name, Subject, and Body in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-23T13:15Z",
    "lastModifiedDate" : "2025-05-23T15:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1125",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1125",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1125",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346138",
          "name" : "RHBZ#2346138",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
          "name" : "https://lists.gnu.org/archive/html/grub-devel/2025-02/msg00024.html",
          "refsource" : "",
          "tags" : [ "Mailing List", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When reading data from a hfs filesystem, grub's hfs filesystem module uses user-controlled parameters from the filesystem metadata to calculate the internal buffers size, however it misses to properly check for integer overflows. A maliciouly crafted filesystem may lead some of those buffer size calculation to overflow, causing it to perform a grub_malloc() operation with a smaller size than expected. As a result the hfsplus_open_compressed_real() function will write past of the internal buffer length. This flaw may be leveraged to corrupt grub's internal critical data and may result in arbitrary code execution by-passing secure boot protections."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:grub2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T15:15Z",
    "lastModifiedDate" : "2025-08-12T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1126",
        "ASSIGNER" : "securityalerts@lexmark.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "name" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Reliance on Untrusted Inputs in a Security Decision vulnerability has been identified in the Lexmark Print Management Client."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T17:15Z",
    "lastModifiedDate" : "2025-02-11T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1127",
        "ASSIGNER" : "securityalerts@lexmark.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "name" : "https://www.lexmark.com/en_us/solutions/security/lexmark-security-advisories.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The vulnerability can be leveraged by an attacker to execute arbitrary code as an unprivileged user and/or modify the contents of any data on the filesystem."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T19:15Z",
    "lastModifiedDate" : "2025-02-13T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1128",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wpeverest/everest-forms/commit/7d37858d2c614aa107b0f495fe50819a3867e7f5",
          "name" : "https://github.com/wpeverest/everest-forms/commit/7d37858d2c614aa107b0f495fe50819a3867e7f5",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/wpeverest/everest-forms/pull/1406/files",
          "name" : "https://github.com/wpeverest/everest-forms/pull/1406/files",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3237831/everest-forms/trunk/includes/abstracts/class-evf-form-fields-upload.php#file0",
          "name" : "https://plugins.trac.wordpress.org/changeset/3237831/everest-forms/trunk/includes/abstracts/class-evf-form-fields-upload.php#file0",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3243663/everest-forms#file7",
          "name" : "https://plugins.trac.wordpress.org/changeset/3243663/everest-forms#file7",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c04d8c9-acad-4832-aa8a-8372c58a0387?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c04d8c9-acad-4832-aa8a-8372c58a0387?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Everest Forms – Contact Forms, Quiz, Survey, Newsletter & Payment Form Builder for WordPress plugin for WordPress is vulnerable to arbitrary file upload, read, and deletion due to missing file type and path validation in the 'format' method of the EVF_Form_Fields_Upload class in all versions up to, and including, 3.0.9.4. This makes it possible for unauthenticated attackers to upload, read, and delete arbitrary files on the affected site's server which may make remote code execution, sensitive information disclosure, or a site takeover possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpeverest:everest_forms:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.0.9.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-25T07:15Z",
    "lastModifiedDate" : "2025-02-28T15:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1132",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7251",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7251",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A time-based blind SQL Injection vulnerability exists in the ChurchCRM 5.13.0 and prior EditEventAttendees.php within the EN_tyid parameter. The parameter is directly inserted into an SQL query without proper sanitization, allowing attackers to inject malicious SQL commands. Please note that the vulnerability requires Administrator permissions. This flaw can potentially allow attackers to delay the response, indicating the presence of an SQL injection vulnerability. While it is a time-based blind injection, it can be exploited to gain insights into the underlying database, and with further exploitation, sensitive data could be retrieved."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-19T09:15Z",
    "lastModifiedDate" : "2025-02-25T21:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1133",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7252",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7252",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based blind SQL Injection vulnerability in the EditEventAttendees functionality. The EID parameter is directly concatenated into an SQL query without proper sanitization, making it susceptible to SQL injection attacks. An attacker can manipulate the query, potentially leading to data exfiltration, modification, or deletion.  Please note that this vulnerability requires Administrator privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-19T09:15Z",
    "lastModifiedDate" : "2025-02-25T21:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1134",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7253",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7253",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in ChurchCRM 5.13.0 and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the DonatedItemEditor functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note that this vulnerability requires Administrator privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-19T09:15Z",
    "lastModifiedDate" : "2025-02-25T21:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1135",
        "ASSIGNER" : "ict.security@gridware.com.au"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ChurchCRM/CRM/issues/7254",
          "name" : "https://github.com/ChurchCRM/CRM/issues/7254",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in ChurchCRM 5.13.0. and prior that allows an attacker to execute arbitrary SQL queries by exploiting a boolean-based and time-based blind SQL Injection vulnerability in the BatchWinnerEntry functionality. The CurrentFundraiser parameter is directly concatenated into an SQL query without sufficient sanitization, allowing an attacker to manipulate database queries and execute arbitrary commands, potentially leading to data exfiltration, modification, or deletion. Please note the vulnerability requires Administrator privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:churchcrm:churchcrm:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-19T09:15Z",
    "lastModifiedDate" : "2025-02-25T21:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1137",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7233085",
          "name" : "https://www.ibm.com/support/pages/node/7233085",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Storage Scale 5.2.2.0 and 5.2.2.1, under certain configurations, could allow an authenticated user to execute privileged commands due to improper input neutralization."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_scale:5.2.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_scale:5.2.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-10T03:15Z",
    "lastModifiedDate" : "2025-08-12T01:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1138",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-548"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7230295",
          "name" : "https://www.ibm.com/support/pages/node/7230295",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM InfoSphere Information Server 11.7 could disclose sensitive information to an authenticated user that could aid in further attacks against the system through a directory listing."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-15T21:15Z",
    "lastModifiedDate" : "2025-06-04T20:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1143",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8414-096ce-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8414-096ce-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8413-ec9a5-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8413-ec9a5-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Certain models of routers from Billion Electric has hard-coded embedded linux credentials, allowing attackers to log in through the SSH service using these credentials and obtain root privilege of the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T04:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1144",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-497"
          }, {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8416-b6cba-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8416-b6cba-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8415-853e0-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8415-853e0-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "School Affairs System from Quanxun has an Exposure of Sensitive Information, allowing unauthenticated attackers to view specific pages and obtain database information as well as plaintext administrator credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T04:15Z",
    "lastModifiedDate" : "2025-02-11T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1145",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8418-40958-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8418-40958-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8417-ea1ea-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8417-ea1ea-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NetVision Information ISOinsight has a Reflected Cross-site Scripting vulnerability, allowing unauthenticated remote attackers to execute arbitrary JavaScript code in the user's browser through phishing techniques."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T04:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1146",
        "ASSIGNER" : "PSIRT@crowdstrike.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.crowdstrike.com/security-advisories/cve-2025-1146/",
          "name" : "https://www.crowdstrike.com/security-advisories/cve-2025-1146/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CrowdStrike uses industry-standard TLS (transport layer security) to secure communications from the Falcon sensor to the CrowdStrike cloud. CrowdStrike has identified a validation logic error in the Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor where our TLS connection routine to the CrowdStrike cloud can incorrectly process server certificate validation. This could allow an attacker with the ability to control network traffic to potentially conduct a man-in-the-middle (MiTM) attack. CrowdStrike identified this issue internally and released a security fix in all Falcon sensor for Linux, Falcon Kubernetes Admission Controller, and Falcon Container Sensor versions 7.06 and above.\n\n \nCrowdStrike identified this issue through our longstanding, rigorous security review process, which has been continually strengthened with deeper source code analysis and ongoing program enhancements as part of our commitment to security resilience. CrowdStrike has no indication of any exploitation of this issue in the wild. CrowdStrike has leveraged its world class threat hunting and intelligence capabilities to actively monitor for signs of abuse or usage of this flaw and will continue to do so. \n\n\nWindows and Mac sensors are not affected by this."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T19:15Z",
    "lastModifiedDate" : "2025-02-12T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1147",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250404-0003/",
          "name" : "https://security.netapp.com/advisory/ntap-20250404-0003/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15881",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15881",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32556",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32556",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295051",
          "name" : "VDB-295051 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295051",
          "name" : "VDB-295051 | GNU Binutils nm nm.c internal_strlen buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485254",
          "name" : "Submit #485254 | GNU binutils/nm 2.43 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in GNU Binutils 2.43 and classified as problematic. Affected by this vulnerability is the function __sanitizer::internal_strlen of the file binutils/nm.c of the component nm. The manipulation of the argument const leads to buffer overflow. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-10T14:15Z",
    "lastModifiedDate" : "2025-04-04T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1148",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250404-0004/",
          "name" : "https://security.netapp.com/advisory/ntap-20250404-0004/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295052",
          "name" : "VDB-295052 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295052",
          "name" : "VDB-295052 | GNU Binutils ld ldelfgen.c link_order_scan memory leak",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.485747",
          "name" : "Submit #485747 | GNU binutils/ld 2.43 Memory Leak",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43 and classified as problematic. Affected by this issue is the function link_order_scan of the file ld/ldelfgen.c of the component ld. The manipulation leads to memory leak. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-10T14:15Z",
    "lastModifiedDate" : "2025-04-04T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1149",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          }, {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295053",
          "name" : "VDB-295053 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295053",
          "name" : "VDB-295053 | GNU Binutils ld xmalloc.c xstrdup memory leak",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43. It has been classified as problematic. This affects the function xstrdup of the file libiberty/xmalloc.c of the component ld. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-10T15:15Z",
    "lastModifiedDate" : "2025-03-04T14:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1150",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          }, {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295054",
          "name" : "VDB-295054 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295054",
          "name" : "VDB-295054 | GNU Binutils ld libbfd.c bfd_malloc memory leak",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. This vulnerability affects the function bfd_malloc of the file libbfd.c of the component ld. The manipulation leads to memory leak. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-10T17:15Z",
    "lastModifiedDate" : "2025-03-11T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1151",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          }, {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295055",
          "name" : "VDB-295055 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295055",
          "name" : "VDB-295055 | GNU Binutils ld xmemdup.c xmemdup memory leak",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43. It has been rated as problematic. This issue affects the function xmemdup of the file xmemdup.c of the component ld. The manipulation leads to memory leak. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-10T17:15Z",
    "lastModifiedDate" : "2025-02-10T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1152",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          }, {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15887",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32576",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295056",
          "name" : "VDB-295056 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295056",
          "name" : "VDB-295056 | GNU Binutils ld xstrdup.c xstrdup memory leak",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in GNU Binutils 2.43. Affected is the function xstrdup of the file xstrdup.c of the component ld. The manipulation leads to memory leak. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue. The code maintainer explains: \"I'm not going to commit some of the leak fixes I've been working on to the 2.44 branch due to concern that would destabilise ld. All of the reported leaks in this bugzilla have been fixed on binutils master.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-10T18:15Z",
    "lastModifiedDate" : "2025-03-03T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1153",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250404-0005/",
          "name" : "https://security.netapp.com/advisory/ntap-20250404-0005/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32603",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32603",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150",
          "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295057",
          "name" : "VDB-295057 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295057",
          "name" : "VDB-295057 | GNU Binutils format.c bfd_set_format memory corruption",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.489991",
          "name" : "Submit #489991 | GNU binutils/ld 2.43 Buffer Over-read",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in GNU Binutils 2.43/2.44. Affected by this vulnerability is the function bfd_set_format of the file format.c. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 2.45 is able to address this issue. The identifier of the patch is 8d97c1a53f3dc9fd8e1ccdb039b8a33d50133150. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.44:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-10T19:15Z",
    "lastModifiedDate" : "2025-04-04T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1154",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/GSBP0/9d26bf092647018e39eb515fb6c1eb0a",
          "name" : "https://gist.github.com/GSBP0/9d26bf092647018e39eb515fb6c1eb0a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295058",
          "name" : "VDB-295058 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295058",
          "name" : "VDB-295058 | xxyopen Novel books sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.492531",
          "name" : "Submit #492531 | xxyopen https://github.com/201206030/novel <= 3.4.1 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in xxyopen Novel up to 3.4.1. Affected by this issue is some unknown functionality of the file /api/front/search/books. The manipulation of the argument sort leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-10T20:15Z",
    "lastModifiedDate" : "2025-02-10T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1155",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mano257200/Qloapp-XSS-Vulnerability/tree/main",
          "name" : "https://github.com/mano257200/Qloapp-XSS-Vulnerability/tree/main",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/mano257200/Qloapp-XSS-Vulnerability/tree/main",
          "name" : "https://github.com/mano257200/Qloapp-XSS-Vulnerability/tree/main",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295059",
          "name" : "VDB-295059 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295059",
          "name" : "VDB-295059 | Webkul QloApps Your Location Search stores cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.492777",
          "name" : "Submit #492777 | Webkul QloApps v1.6.1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Webkul QloApps 1.6.1. This affects an unknown part of the file /stores of the component Your Location Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. It is planned to remove this page in the long term."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webkul:qloapps:1.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-10T20:15Z",
    "lastModifiedDate" : "2025-06-20T17:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1156",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295060",
          "name" : "VDB-295060 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295060",
          "name" : "VDB-295060 | Pix Software Vivaz servlet sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.493482",
          "name" : "https://vuldb.com/?submit.493482",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.493482",
          "name" : "Submit #493482 | Pix Software Vivaz 6.0.10 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Pix Software Vivaz 6.0.10 and classified as critical. This vulnerability affects unknown code of the file /servlet?act=login. The manipulation of the argument usuario leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-10T21:15Z",
    "lastModifiedDate" : "2025-02-10T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1157",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295061",
          "name" : "VDB-295061 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295061",
          "name" : "VDB-295061 | Allims lab.online model_recuperar_senha.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.493492",
          "name" : "Submit #493492 | Allims Lab.Online Latest SQL Injection With High Privileges",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Allims lab.online up to 20250201 and classified as critical. This issue affects some unknown processing of the file /model/model_recuperar_senha.php. The manipulation of the argument recuperacao leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-10T21:15Z",
    "lastModifiedDate" : "2025-02-10T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1158",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/addPolicyToSafetyGroup.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/addPolicyToSafetyGroup.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295062",
          "name" : "VDB-295062 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295062",
          "name" : "VDB-295062 | ESAFENET CDG addPolicyToSafetyGroup.jsp sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.493644",
          "name" : "Submit #493644 | esafenet CDGV5 V5.6.3.154.205_20250114 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG 5.6.3.154.205_20250114. It has been classified as critical. Affected is an unknown function of the file addPolicyToSafetyGroup.jsp. The manipulation of the argument safetyGroupId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-10T22:15Z",
    "lastModifiedDate" : "2025-02-10T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1159",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting-%20Teachers%20Account%20Takeover%20Possibility.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting-%20Teachers%20Account%20Takeover%20Possibility.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Mitigation" ]
        }, {
          "url" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting-%20Teachers%20Account%20Takeover%20Possibility.pdf",
          "name" : "https://github.com/KhukuriRimal/Vulnerabilities/blob/main/Stored%20Cross%20Site%20Scripting-%20Teachers%20Account%20Takeover%20Possibility.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Mitigation" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295063",
          "name" : "VDB-295063 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295063",
          "name" : "VDB-295063 | CampCodes School Management Software academic-calendar cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.493687",
          "name" : "Submit #493687 | CampCodes School Management Software 1.0 Account Takeover Possibility via Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.campcodes.com/",
          "name" : "https://www.campcodes.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in CampCodes School Management Software 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /academic-calendar. The manipulation leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:campcodes:school_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-10T22:15Z",
    "lastModifiedDate" : "2025-03-28T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1160",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/jmx0hxq/0e9cde14b6e9190a7451cd72d7b23bfd",
          "name" : "https://gist.github.com/jmx0hxq/0e9cde14b6e9190a7451cd72d7b23bfd",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295064",
          "name" : "VDB-295064 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295064",
          "name" : "VDB-295064 | SourceCodester Employee Management System index.php default credentials",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.493860",
          "name" : "Submit #493860 | SourceCodester Employee Management System 1.0 Use of Default Password",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file index.php. The manipulation of the argument username/password leads to use of default credentials. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:remyandrade:employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-10T23:15Z",
    "lastModifiedDate" : "2025-03-03T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1162",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_two/blob/main/web1.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_two/blob/main/web1.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295065",
          "name" : "VDB-295065 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295065",
          "name" : "VDB-295065 | code-projects Job Recruitment load\\_user-profile.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494007",
          "name" : "Submit #494007 | code-projects job-recruitment-in-php v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Job Recruitment 1.0. This affects an unknown part of the file /\\_parse/load\\_user-profile.php. The manipulation of the argument userhash leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-10T23:15Z",
    "lastModifiedDate" : "2025-05-28T17:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1163",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_three/blob/main/binary1.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_three/blob/main/binary1.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_three/blob/main/binary1.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_three/blob/main/binary1.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295066",
          "name" : "VDB-295066 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295066",
          "name" : "VDB-295066 | code-projects Vehicle Parking Management System Authentication login stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494008",
          "name" : "Submit #494008 | c vehicle-parking-management-system-c-programming v1.0 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Vehicle Parking Management System 1.0. This vulnerability affects the function login of the component Authentication. The manipulation of the argument username leads to stack-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:vehicle_parking_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-11T00:15Z",
    "lastModifiedDate" : "2025-04-10T20:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1164",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_four/blob/main/binary2.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_four/blob/main/binary2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_four/blob/main/binary2.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_four/blob/main/binary2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295067",
          "name" : "VDB-295067 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295067",
          "name" : "VDB-295067 | code-projects Police FIR Record Management System Add Record stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494009",
          "name" : "Submit #494009 | code-projects POLICE FIR RECORD MANAGEMENT SYSTEM V1/0 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Police FIR Record Management System 1.0. This issue affects some unknown processing of the component Add Record Handler. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:police_fir_record_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-11T00:15Z",
    "lastModifiedDate" : "2025-04-11T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1165",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/Lserp/fileUpload_1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/Lserp/fileUpload_1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295068",
          "name" : "VDB-295068 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295068",
          "name" : "VDB-295068 | Lumsoft ERP FileUploadApi.ashx DoWebUpload unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.494516",
          "name" : "Submit #494516 | ?? lumsoft ERP V8 Remote Code Execution (RCE)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Lumsoft ERP 8. Affected is the function DoUpload/DoWebUpload of the file /Api/FileUploadApi.ashx. The manipulation of the argument file leads to unrestricted upload. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T01:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1166",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/jmx0hxq/0ce2c97ca11b2423a203b5719438c9f8",
          "name" : "https://gist.github.com/jmx0hxq/0ce2c97ca11b2423a203b5719438c9f8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295069",
          "name" : "VDB-295069 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295069",
          "name" : "VDB-295069 | SourceCodester Food Menu Manager update.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494567",
          "name" : "Submit #494567 | SourceCodester Food Menu Manager 1.0 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in SourceCodester Food Menu Manager 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file endpoint/update.php. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:remyandrade:food_menu_manager:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T02:15Z",
    "lastModifiedDate" : "2025-08-01T01:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1167",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295070",
          "name" : "VDB-295070 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295070",
          "name" : "VDB-295070 | Mayuri K Employee Management System Update_User.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494725",
          "name" : "Submit #494725 | mayuri_k Web 1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Mayuri K Employee Management System up to 192.168.70.3 and classified as critical. Affected by this issue is some unknown functionality of the file /hr_soft/admin/Update_User.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:employee_management_system:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "192.168.70.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T02:15Z",
    "lastModifiedDate" : "2025-05-26T01:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1168",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295072",
          "name" : "VDB-295072 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295072",
          "name" : "VDB-295072 | SourceCodester Contact Manager with Export to VCF delete-contact.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.494766",
          "name" : "Submit #494766 | https://www.sourcecodester.com/php/17556/contact-manager-export- Web 1 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Contact Manager with Export to VCF 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /endpoint/delete-contact.php. The manipulation of the argument contact leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rems:contact_manager_with_export_to_vcf:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T02:15Z",
    "lastModifiedDate" : "2025-03-03T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1169",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295073",
          "name" : "VDB-295073 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295073",
          "name" : "VDB-295073 | SourceCodester Image Compressor Tool compressor.php cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.494775",
          "name" : "Submit #494775 | https://www.sourcecodester.com/php/17431/image-compressor-tool-u web 1 Open Redirect",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Image Compressor Tool 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /image-compressor/compressor.php. The manipulation of the argument image leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rems:image_compressor_tool:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-11T03:15Z",
    "lastModifiedDate" : "2025-03-03T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1170",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_five/blob/main/web2.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_five/blob/main/web2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295074",
          "name" : "VDB-295074 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295074",
          "name" : "VDB-295074 | code-projects Real Estate Property Management System Category.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494829",
          "name" : "Submit #494829 | code-projects Real Estate Property Management System V1/0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /Admin/Category.php. The manipulation of the argument Desc leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-11T03:15Z",
    "lastModifiedDate" : "2025-03-03T16:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1171",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/J0hnFFFF/j0hn_upload_six/blob/main/web3.pdf",
          "name" : "https://github.com/J0hnFFFF/j0hn_upload_six/blob/main/web3.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295075",
          "name" : "VDB-295075 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295075",
          "name" : "VDB-295075 | code-projects Real Estate Property Management System CustomerReport.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.494830",
          "name" : "Submit #494830 | code-projects Real Estate Property Management System V1/0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in code-projects Real Estate Property Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument Address leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-11T04:15Z",
    "lastModifiedDate" : "2025-02-28T02:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1172",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/NeoVuln/CVE/issues/1",
          "name" : "https://github.com/NeoVuln/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295076",
          "name" : "VDB-295076 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295076",
          "name" : "VDB-295076 | 1000 Projects Bookstore Management System addtocart.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495183",
          "name" : "Submit #495183 | 1000 Projects Bookstore Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in 1000 Projects Bookstore Management System 1.0. Affected by this issue is some unknown functionality of the file addtocart.php. The manipulation of the argument bcid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T04:15Z",
    "lastModifiedDate" : "2025-02-28T02:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1173",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/NeoVuln/CVE/issues/2",
          "name" : "https://github.com/NeoVuln/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295077",
          "name" : "VDB-295077 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295077",
          "name" : "VDB-295077 | 1000 Projects Bookstore Management System process_users_del.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495309",
          "name" : "Submit #495309 | 1000 Projects Bookstore Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in 1000 Projects Bookstore Management System 1.0. This affects an unknown part of the file process_users_del.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T05:15Z",
    "lastModifiedDate" : "2025-02-28T02:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1174",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/NeoVuln/CVE/issues/3",
          "name" : "https://github.com/NeoVuln/CVE/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295078",
          "name" : "VDB-295078 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295078",
          "name" : "VDB-295078 | 1000 Projects Bookstore Management System Add Book Page process_book_add.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495318",
          "name" : "Submit #495318 | 1000 Projects Bookstore Management System 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in 1000 Projects Bookstore Management System 1.0 and classified as problematic. This vulnerability affects unknown code of the file process_book_add.php of the component Add Book Page. The manipulation of the argument Book Name leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:bookstore_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-11T05:15Z",
    "lastModifiedDate" : "2025-02-28T02:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1175",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-kelio-visio",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-kelio-visio",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Reflected Cross-Site Scripting (XSS) vulnerability in Kelio Visio 1, Kelio Visio X7 and Kelio Visio X4, in versions between 3.2C and 5.1K. This vulnerability could allow an attacker to execute a JavaScript payload by making a POST request and injecting malicious code into the editable ‘username’ parameter of the ‘/PageLoginVisio.do’ endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-10T13:15Z",
    "lastModifiedDate" : "2025-02-10T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1176",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250411-0007/",
          "name" : "https://security.netapp.com/advisory/ntap-20250411-0007/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15913",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15913",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32636",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32636",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Patch" ]
        }, {
          "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814",
          "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=f9978defb6fab0bd8583942d97c112b0932ac814",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295079",
          "name" : "VDB-295079 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?id.295079",
          "name" : "VDB-295079 | GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec heap-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.495329",
          "name" : "Submit #495329 | GNU binutils/ld 2.43 Heap-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43 and classified as critical. This issue affects the function _bfd_elf_gc_mark_rsec of the file elflink.c of the component ld. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. The patch is named f9978defb6fab0bd8583942d97c112b0932ac814. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-11T06:15Z",
    "lastModifiedDate" : "2025-04-11T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1177",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/stevenchen0x01/CVE2/blob/main/cve2.md",
          "name" : "https://github.com/stevenchen0x01/CVE2/blob/main/cve2.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295080",
          "name" : "VDB-295080 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.295080",
          "name" : "VDB-295080 | dayrui XunRuiCMS Linkage.php import_add deserialization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.495366",
          "name" : "Submit #495366 | gitee XunruiCms v4.6.3 Deserialization and code excute",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in dayrui XunRuiCMS 4.6.3. It has been classified as critical. Affected is the function import_add of the file dayrui/Fcms/Control/Admin/Linkage.php. The manipulation leads to deserialization. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xunruicms:xunruicms:4.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T06:15Z",
    "lastModifiedDate" : "2025-02-20T15:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1178",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250411-0008/",
          "name" : "https://security.netapp.com/advisory/ntap-20250411-0008/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15914",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15914",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32638",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32638",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32638",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32638",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0",
          "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=75086e9de1707281172cc77f178e7949a4414ed0",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295081",
          "name" : "VDB-295081 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295081",
          "name" : "VDB-295081 | GNU Binutils ld libbfd.c bfd_putl64 memory corruption",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495369",
          "name" : "Submit #495369 | GNU ld 2.43 Illegal write access",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43. It has been declared as problematic. Affected by this vulnerability is the function bfd_putl64 of the file libbfd.c of the component ld. The manipulation leads to memory corruption. The attack can be launched remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The identifier of the patch is 75086e9de1707281172cc77f178e7949a4414ed0. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:vmware_vsphere:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T07:15Z",
    "lastModifiedDate" : "2025-05-21T20:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1179",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15915",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15915",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32640",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32640",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32640#c1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295082",
          "name" : "VDB-295082 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295082",
          "name" : "VDB-295082 | GNU Binutils ld libbfd.c bfd_putl64 memory corruption",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495376",
          "name" : "Submit #495376 | GNU ld 2.43 Illegal write access with -w option",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU Binutils 2.43. It has been rated as critical. Affected by this issue is the function bfd_putl64 of the file bfd/libbfd.c of the component ld. The manipulation leads to memory corruption. The attack may be launched remotely. The complexity of an attack is rather high. The exploitation is known to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 2.44 is able to address this issue. It is recommended to upgrade the affected component. The code maintainer explains, that \"[t]his bug has been fixed at some point between the 2.43 and 2.44 releases\"."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T07:15Z",
    "lastModifiedDate" : "2025-03-03T16:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1180",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15917",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15917",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32642",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32642",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32642",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32642",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295083",
          "name" : "VDB-295083 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295083",
          "name" : "VDB-295083 | GNU Binutils ld elf-eh-frame.c _bfd_elf_write_section_eh_frame memory corruption",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495381",
          "name" : "https://vuldb.com/?submit.495381",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495381",
          "name" : "Submit #495381 | GNU ld 2.43 Illegal read access with --gc-sections --gc-keep-exporte option",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in GNU Binutils 2.43. This affects the function _bfd_elf_write_section_eh_frame of the file bfd/elf-eh-frame.c of the component ld. The manipulation leads to memory corruption. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T08:15Z",
    "lastModifiedDate" : "2025-05-21T20:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1181",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250425-0007/",
          "name" : "https://security.netapp.com/advisory/ntap-20250425-0007/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15918",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15918",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32643",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32643",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32643",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32643",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24",
          "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=931494c9a89558acb36a03a340c01726545eef24",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295084",
          "name" : "VDB-295084 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295084",
          "name" : "VDB-295084 | GNU Binutils ld elflink.c _bfd_elf_gc_mark_rsec memory corruption",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495402",
          "name" : "https://vuldb.com/?submit.495402",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495402",
          "name" : "Submit #495402 | GNU ld 2.43 illegal read access with --gc-sections --no-print-gc-sections -w",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in GNU Binutils 2.43. This vulnerability affects the function _bfd_elf_gc_mark_rsec of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 931494c9a89558acb36a03a340c01726545eef24. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap_select_deploy_administration_utility:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:linux:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:active_iq_unified_manager:-:*:*:*:*:windows:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T08:15Z",
    "lastModifiedDate" : "2025-05-21T20:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1182",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15919",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15919",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32644",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32644",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32644",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32644",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad",
          "name" : "https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=b425859021d17adf62f06fb904797cf8642986ad",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295086",
          "name" : "VDB-295086 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295086",
          "name" : "VDB-295086 | GNU Binutils ld elflink.c bfd_elf_reloc_symbol_deleted_p memory corruption",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495407",
          "name" : "https://vuldb.com/?submit.495407",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495407",
          "name" : "Submit #495407 | GNU ld 2.43 illegal read access with --no-undefined --orphan-handling -wrd",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in GNU Binutils 2.43. Affected is the function bfd_elf_reloc_symbol_deleted_p of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The patch is identified as b425859021d17adf62f06fb904797cf8642986ad. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gnu:binutils:2.43:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T09:15Z",
    "lastModifiedDate" : "2025-05-21T20:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1183",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295087",
          "name" : "VDB-295087 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295087",
          "name" : "VDB-295087 | CodeZips Gym Management System more-userprofile.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495410",
          "name" : "Submit #495410 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/polaris-pisym/aevk1q/fyu4dy8fglbs6rzy",
          "name" : "https://www.yuque.com/polaris-pisym/aevk1q/fyu4dy8fglbs6rzy",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in CodeZips Gym Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /dashboard/admin/more-userprofile.php. The manipulation of the argument login_id leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T07:15Z",
    "lastModifiedDate" : "2025-02-25T18:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1184",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/janssensjelle/published-pocs/blob/main/pihome_sqli_ajax.md",
          "name" : "https://github.com/janssensjelle/published-pocs/blob/main/pihome_sqli_ajax.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295088",
          "name" : "VDB-295088 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295088",
          "name" : "VDB-295088 | pihome-shc PiHome ajax.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.495413",
          "name" : "Submit #495413 | Pihome-SHC Pihome 1.77 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in pihome-shc PiHome 1.77 and classified as critical. Affected by this issue is some unknown functionality of the file /ajax.php?Ajax=GetModal_MQTTEdit. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T07:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1185",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehva_sqli_ajax.md",
          "name" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehva_sqli_ajax.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295089",
          "name" : "VDB-295089 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295089",
          "name" : "VDB-295089 | pihome-shc PiHome ajax.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.495548",
          "name" : "Submit #495548 | Pihome PiHomeHVAC 2.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in pihome-shc PiHome 2.0. It has been classified as critical. This affects an unknown part of the file /ajax.php?Ajax=GetModal_Sensor_Graph. The manipulation leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T08:15Z",
    "lastModifiedDate" : "2025-02-18T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1186",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/pwysec/d6qRhl/blob/main/1.pdf",
          "name" : "https://github.com/pwysec/d6qRhl/blob/main/1.pdf",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295090",
          "name" : "VDB-295090 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295090",
          "name" : "VDB-295090 | dayrui XunRuiCMS Api.php deserialization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495820",
          "name" : "Submit #495820 | ????????????? ??CMS <=4.6.4 (2024-12-17) Remote Code Execute",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in dayrui XunRuiCMS up to 4.6.4. It has been declared as critical. This vulnerability affects unknown code of the file /Control/Api/Api.php. The manipulation of the argument thumb leads to deserialization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xunruicms:xunruicms:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "4.6.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T08:15Z",
    "lastModifiedDate" : "2025-07-03T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1187",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/zzzxc643/cve/blob/main/STACK_OVERFLOW_cve.md",
          "name" : "https://github.com/zzzxc643/cve/blob/main/STACK_OVERFLOW_cve.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295093",
          "name" : "VDB-295093 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295093",
          "name" : "VDB-295093 | code-projects Police FIR Record Management System Delete Record stack-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495921",
          "name" : "Submit #495921 | code-projects POLICE FIR RECORD MANAGEMENT SYSTEM v1.0 c stack overflow",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Police FIR Record Management System 1.0. Affected by this vulnerability is an unknown functionality of the component Delete Record Handler. The manipulation leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:police_fir_record_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T09:15Z",
    "lastModifiedDate" : "2025-02-18T21:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1188",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/takakie/CVE/blob/main/cve_1.md",
          "name" : "https://github.com/takakie/CVE/blob/main/cve_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295094",
          "name" : "VDB-295094 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295094",
          "name" : "VDB-295094 | Codezips Gym Management System updateroutine.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496409",
          "name" : "Submit #496409 | Codezips Gym Management System in PHP with Source Code v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Codezips Gym Management System 1.0. Affected by this issue is some unknown functionality of the file /dashboard/admin/updateroutine.php. The manipulation of the argument tid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T09:15Z",
    "lastModifiedDate" : "2025-02-25T21:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1189",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://1000projects.org/",
          "name" : "https://1000projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/takakie/CVE/blob/main/cve_2.md",
          "name" : "https://github.com/takakie/CVE/blob/main/cve_2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295095",
          "name" : "VDB-295095 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295095",
          "name" : "VDB-295095 | 1000 Projects Attendance Tracking Management System chart1.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496452",
          "name" : "Submit #496452 | 1000 Projects Attendance Tracking Management System PHP & MySQL Project V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in 1000 Projects Attendance Tracking Management System 1.0. This affects an unknown part of the file /admin/chart1.php. The manipulation of the argument course_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:1000projects:attendance_tracking_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T10:15Z",
    "lastModifiedDate" : "2025-02-20T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1190",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment-load_applicants-xss.pdf",
          "name" : "https://github.com/1337g/CVE-2025-X/blob/main/job-recruitment-load_applicants-xss.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295096",
          "name" : "VDB-295096 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295096",
          "name" : "VDB-295096 | code-projects Job Recruitment load_user-profile.php cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496670",
          "name" : "Submit #496670 | code-projects job-recruitment-in-php 1/0 php Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Exploit", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Job Recruitment 1.0 and classified as problematic. This vulnerability affects unknown code of the file /_parse/load_user-profile.php. The manipulation leads to cross site scripting. The attack can be initiated remotely. Multiple parameters might be affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:job_recruitment:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T10:15Z",
    "lastModifiedDate" : "2025-02-18T18:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1191",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Keyand/Multi-Restaurant-Table-Reservation-System-Search/blob/main/Multi%20Restaurant%20Table%20Reservation%20System%20approve-reject.php%20has%20Sqlinjection.pdf",
          "name" : "https://github.com/Keyand/Multi-Restaurant-Table-Reservation-System-Search/blob/main/Multi%20Restaurant%20Table%20Reservation%20System%20approve-reject.php%20has%20Sqlinjection.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295097",
          "name" : "VDB-295097 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295097",
          "name" : "VDB-295097 | SourceCodester Multi Restaurant Table Reservation System approve-reject.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496729",
          "name" : "Submit #496729 | www.sourcecodester.com Multi Restaurant Table Reservation System 1.0 Sqlinjection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Multi Restaurant Table Reservation System 1.0 and classified as critical. This issue affects some unknown processing of the file /dashboard/approve-reject.php. The manipulation of the argument breject_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:janobe:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T11:15Z",
    "lastModifiedDate" : "2025-02-18T17:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1192",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Keyand/Multi-Restaurant-Table-Reservation-System-Search/blob/main/Multi%20Restaurant%20Table%20Reservation%20System%20select-menu.php%20has%20Sqlinjection.pdf",
          "name" : "https://github.com/Keyand/Multi-Restaurant-Table-Reservation-System-Search/blob/main/Multi%20Restaurant%20Table%20Reservation%20System%20select-menu.php%20has%20Sqlinjection.pdf",
          "refsource" : "",
          "tags" : [ "Broken Link", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295098",
          "name" : "VDB-295098 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295098",
          "name" : "VDB-295098 | SourceCodester Multi Restaurant Table Reservation System select-menu.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496730",
          "name" : "Submit #496730 | www.sourcecodester.com Multi Restaurant Table Reservation System 1.0 Sqlinjection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Multi Restaurant Table Reservation System 1.0. It has been classified as critical. Affected is an unknown function of the file select-menu.php. The manipulation of the argument table leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:janobe:multi_restaurant_table_reservation_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T11:15Z",
    "lastModifiedDate" : "2025-02-18T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1193",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0001/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0001/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper host validation in the certificate validation component in Devolutions Remote Desktop Manager on 2024.3.19 and earlier on Windows allows an attacker to intercept and modify encrypted communications via a man-in-the-middle attack \nby presenting a certificate for a different host."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
          "versionEndExcluding" : "2024.3.20.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
          "versionEndExcluding" : "2024.3.20.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-10T14:15Z",
    "lastModifiedDate" : "2025-03-28T16:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1194",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/huggingface/transformers/commit/92c5ca9dd70de3ade2af2eb835c96215cc50e815",
          "name" : "https://github.com/huggingface/transformers/commit/92c5ca9dd70de3ade2af2eb835c96215cc50e815",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2",
          "name" : "https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2",
          "name" : "https://huntr.com/bounties/86f58dcd-683f-4adc-a735-849f51e9abb2",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Regular Expression Denial of Service (ReDoS) vulnerability was identified in the huggingface/transformers library, specifically in the file `tokenization_gpt_neox_japanese.py` of the GPT-NeoX-Japanese model. The vulnerability occurs in the SubWordJapaneseTokenizer class, where regular expressions process specially crafted inputs. The issue stems from a regex exhibiting exponential complexity under certain conditions, leading to excessive backtracking. This can result in high CPU usage and potential application downtime, effectively creating a Denial of Service (DoS) scenario. The affected version is v4.48.1 (latest)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:huggingface:transformers:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.50.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-29T12:15Z",
    "lastModifiedDate" : "2025-08-01T21:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1195",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/YinshengLu/CVE/blob/main/cve1.pdf",
          "name" : "https://github.com/YinshengLu/CVE/blob/main/cve1.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295103",
          "name" : "VDB-295103 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295103",
          "name" : "VDB-295103 | code-projects Real Estate Property Management System EditCategory cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496854",
          "name" : "Submit #496854 | code-projects Real Estate Property Management System 1/0 php Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Real Estate Property Management System 1.0. This issue affects some unknown processing of the file /Admin/EditCategory. The manipulation of the argument CategoryId leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T12:15Z",
    "lastModifiedDate" : "2025-02-20T20:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1196",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/YinshengLu/CVE/blob/main/cve2.pdf",
          "name" : "https://github.com/YinshengLu/CVE/blob/main/cve2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295104",
          "name" : "VDB-295104 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295104",
          "name" : "VDB-295104 | code-projects Real Estate Property Management System search.php cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496855",
          "name" : "Submit #496855 | code-projects Real Estate Property Management System 1/0 php Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in code-projects Real Estate Property Management System 1.0. Affected is an unknown function of the file /search.php. The manipulation of the argument PropertyName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabian:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T12:15Z",
    "lastModifiedDate" : "2025-02-20T20:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1197",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/YinshengLu/CVE/blob/main/cve3.pdf",
          "name" : "https://github.com/YinshengLu/CVE/blob/main/cve3.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295105",
          "name" : "VDB-295105 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295105",
          "name" : "VDB-295105 | code-projects Real Estate Property Management System load_user-profile.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496856",
          "name" : "Submit #496856 | code-projects Real Estate Property Management System  v1.0 SQL INJECTION",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /_parse/load_user-profile.php. The manipulation of the argument userhash leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T13:15Z",
    "lastModifiedDate" : "2025-02-24T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1198",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-613"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/511477",
          "name" : "GitLab Issue #511477",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue discovered in GitLab CE/EE affecting all versions from 16.11 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 meant that long-lived connections in ActionCable potentially allowed revoked Personal Access Tokens access to streaming results."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.11.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.11.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-13T02:15Z",
    "lastModifiedDate" : "2025-08-06T18:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1199",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/role_crud.php_SQLi.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/role_crud.php_SQLi.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295107",
          "name" : "VDB-295107 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295107",
          "name" : "VDB-295107 | SourceCodester Best Church Management Software role_crud.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496946",
          "name" : "Submit #496946 | Source Codester Best church management software 1.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.1. It has been classified as critical. This affects an unknown part of the file /admin/app/role_crud.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T13:15Z",
    "lastModifiedDate" : "2025-02-18T18:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1200",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/slider_crud.php_SQLi.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/slider_crud.php_SQLi.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/slider_crud.php_SQLi.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/slider_crud.php_SQLi.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295108",
          "name" : "VDB-295108 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295108",
          "name" : "VDB-295108 | SourceCodester Best Church Management Software slider_crud.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496950",
          "name" : "Submit #496950 | Source Codester Best church management software 1.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.1. It has been declared as critical. This vulnerability affects unknown code of the file /admin/app/slider_crud.php. The manipulation of the argument del_id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T14:15Z",
    "lastModifiedDate" : "2025-04-29T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1201",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/profile_crud.php_SQLi.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/profile_crud.php_SQLi.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295109",
          "name" : "VDB-295109 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295109",
          "name" : "VDB-295109 | SourceCodester Best Church Management Software profile_crud.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496951",
          "name" : "Submit #496951 | Source Codester Best church management software 1.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.1. It has been rated as critical. This issue affects some unknown processing of the file /admin/app/profile_crud.php. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Multiple parameters might be affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T14:15Z",
    "lastModifiedDate" : "2025-02-18T18:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1202",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/edit_slider.php.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/edit_slider.php.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295110",
          "name" : "VDB-295110 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295110",
          "name" : "VDB-295110 | SourceCodester Best Church Management Software edit_slider.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496954",
          "name" : "Submit #496954 | SourceCodester Best church management software 1.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in SourceCodester Best Church Management Software 1.1. Affected is an unknown function of the file /admin/edit_slider.php. The manipulation of the argument id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T15:15Z",
    "lastModifiedDate" : "2025-02-18T18:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1203",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/fca0b129-3299-46d6-9231-ca5afd2fdb66/",
          "name" : "https://wpscan.com/vulnerability/fca0b129-3299-46d6-9231-ca5afd2fdb66/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Slider, Gallery, and Carousel by MetaSlider  WordPress plugin before 3.95.0 does not sanitise and escape some of its settings, which could allow high privilege users such as editor to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:metaslider:slider\\,_gallery\\,_and_carousel:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.95.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-24T06:15Z",
    "lastModifiedDate" : "2025-04-08T13:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1204",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-912"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated?ref=vault33.org",
          "name" : "https://claroty.com/team82/research/are-contec-cms8000-patient-monitors-infected-with-a-chinese-backdoor-the-reality-is-more-complicated?ref=vault33.org",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-030-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The \"update\" binary in the firmware of the affected product sends attempts to mount to a hard-coded, routable IP address, bypassing existing device network settings to do so. The function triggers if the 'C' button is pressed at a specific time during the boot process. If an attacker is able to control or impersonate this IP address, they could upload and overwrite files on the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-25T17:15Z",
    "lastModifiedDate" : "2025-02-25T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1206",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sekaino-sakura/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/sekaino-sakura/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295143",
          "name" : "VDB-295143 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295143",
          "name" : "VDB-295143 | Codezips Gym Management System viewdetailroutine.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496961",
          "name" : "Submit #496961 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. This affects an unknown part of the file /dashboard/admin/viewdetailroutine.php. The manipulation of the argument id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T15:15Z",
    "lastModifiedDate" : "2025-02-20T20:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1207",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/DMCERTCE/TFTPD64_DOS",
          "name" : "https://github.com/DMCERTCE/TFTPD64_DOS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/DMCERTCE/TFTPD64_DOS/blob/main/poc.py",
          "name" : "https://github.com/DMCERTCE/TFTPD64_DOS/blob/main/poc.py",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295144",
          "name" : "VDB-295144 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295144",
          "name" : "VDB-295144 | phjounin TFTPD64 DNS denial of service",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497249",
          "name" : "Submit #497249 | PJO2 TFTPD64 v4.64 Denial of Service",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in phjounin TFTPD64 4.64. It has been declared as problematic. This vulnerability affects unknown code of the component DNS Handler. The manipulation leads to denial of service. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-12T16:15Z",
    "lastModifiedDate" : "2025-02-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1208",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/nanguawuming/CVE2/blob/main/cve1.pdf",
          "name" : "https://github.com/nanguawuming/CVE2/blob/main/cve1.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295145",
          "name" : "VDB-295145 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295145",
          "name" : "VDB-295145 | code-projects Wazifa System Profile.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497355",
          "name" : "Submit #497355 | codeprojects Wazifa v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Wazifa System 1.0. It has been rated as problematic. This issue affects some unknown processing of the file /Profile.php. The manipulation of the argument postcontent leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:wazifa_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T16:15Z",
    "lastModifiedDate" : "2025-02-21T12:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1209",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/nanguawuming/CVE2/blob/main/cve2.pdf",
          "name" : "https://github.com/nanguawuming/CVE2/blob/main/cve2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295146",
          "name" : "VDB-295146 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295146",
          "name" : "VDB-295146 | code-projects Wazifa System search_resualts.php searchuser cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497356",
          "name" : "Submit #497356 | codeprojects Wazifa v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in code-projects Wazifa System 1.0. Affected is the function searchuser of the file /search_resualts.php. The manipulation of the argument firstname/lastname leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. There is a typo in the affected file name."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:wazifa_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-12T17:15Z",
    "lastModifiedDate" : "2025-02-19T19:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1210",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/nanguawuming/CVE2/blob/main/cve3.pdf",
          "name" : "https://github.com/nanguawuming/CVE2/blob/main/cve3.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295147",
          "name" : "VDB-295147 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295147",
          "name" : "VDB-295147 | code-projects Wazifa System control.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497357",
          "name" : "Submit #497357 | codeprojects Wazifa v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Wazifa System 1.0. Affected by this vulnerability is an unknown functionality of the file /controllers/control.php. The manipulation of the argument to leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:anisha:wazifa_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T17:15Z",
    "lastModifiedDate" : "2025-02-19T19:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1211",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/snoopysecurity/996de09ec0cfd0ebdcfdda8ff515deb1",
          "name" : "https://gist.github.com/snoopysecurity/996de09ec0cfd0ebdcfdda8ff515deb1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://gist.github.com/snoopysecurity/996de09ec0cfd0ebdcfdda8ff515deb1",
          "name" : "https://gist.github.com/snoopysecurity/996de09ec0cfd0ebdcfdda8ff515deb1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/benoitc/hackney/commit/9594ce58fabd32cd897fc28fae937694515a3d4a",
          "name" : "https://github.com/benoitc/hackney/commit/9594ce58fabd32cd897fc28fae937694515a3d4a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-HEX-HACKNEY-6516131",
          "name" : "https://security.snyk.io/vuln/SNYK-HEX-HACKNEY-6516131",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf",
          "name" : "https://www.blackhat.com/docs/us-17/thursday/us-17-Tsai-A-New-Era-Of-SSRF-Exploiting-URL-Parser-In-Trending-Programming-Languages.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package hackney before 1.21.0 are vulnerable to Server-side Request Forgery (SSRF) due to improper parsing of URLs by URI built-in module and hackey. Given the URL http://127.0.0.1?@127.2.2.2/, the URI function will parse and see the host as 127.0.0.1 (which is correct), and hackney will refer the host as 127.2.2.2/. \rThis vulnerability can be exploited when users rely on the URL function for host checking."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T05:15Z",
    "lastModifiedDate" : "2025-03-16T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1212",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-497"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/502196",
          "name" : "GitLab Issue #502196",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An information disclosure vulnerability in GitLab CE/EE affecting all versions from 8.3 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2 allows an attacker to send a crafted request to a backend server to reveal sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-12T15:15Z",
    "lastModifiedDate" : "2025-08-06T18:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1213",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/janssensjelle/published-pocs/blob/main/pihome_xss_index.md",
          "name" : "https://github.com/janssensjelle/published-pocs/blob/main/pihome_xss_index.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295172",
          "name" : "VDB-295172 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295172",
          "name" : "VDB-295172 | pihome-shc PiHome index.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497521",
          "name" : "Submit #497521 | pihome-shc PiHome 1.77 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in pihome-shc PiHome 1.77. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /index.php. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-12T18:15Z",
    "lastModifiedDate" : "2025-02-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1214",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md",
          "name" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md",
          "name" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac-improper-access-control.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295173",
          "name" : "VDB-295173 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295173",
          "name" : "VDB-295173 | pihome-shc PiHome Role-Based Access Control user_accounts.php authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497533",
          "name" : "Submit #497533 | pihome-shc PiHome HVAC 2.0 Missing Authorization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in pihome-shc PiHome 2.0. This affects an unknown part of the file /user_accounts.php?uid of the component Role-Based Access Control. The manipulation leads to missing authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T18:15Z",
    "lastModifiedDate" : "2025-02-12T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1215",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9",
          "name" : "https://github.com/vim/vim/commit/c5654b84480822817bb7b69ebc97c174c91185e9",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/vim/vim/issues/16606",
          "name" : "https://github.com/vim/vim/issues/16606",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/vim/vim/issues/16606",
          "name" : "https://github.com/vim/vim/issues/16606",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/vim/vim/releases/tag/v9.1.1097",
          "name" : "https://github.com/vim/vim/releases/tag/v9.1.1097",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250321-0005/",
          "name" : "https://security.netapp.com/advisory/ntap-20250321-0005/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295174",
          "name" : "VDB-295174 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295174",
          "name" : "VDB-295174 | vim main.c memory corruption",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497546",
          "name" : "https://vuldb.com/?submit.497546",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497546",
          "name" : "Submit #497546 | VIM vim 68d08588928b29fe0b19e3513cd689486260ab1c illegal read access",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in vim up to 9.1.1096. This vulnerability affects unknown code of the file src/main.c. The manipulation of the argument --log leads to memory corruption. It is possible to launch the attack on the local host. Upgrading to version 9.1.1097 is able to address this issue. The patch is identified as c5654b84480822817bb7b69ebc97c174c91185e9. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vim:vim:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "9.1.1097",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:netapp:bootstrap_os:-:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T19:15Z",
    "lastModifiedDate" : "2025-08-13T17:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1216",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI74K",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI74K",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI74K",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI74K",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295175",
          "name" : "VDB-295175 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295175",
          "name" : "VDB-295175 | ywoa OaNoticeMapper.xml selectNoticeList sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in ywoa up to 2024.07.03. This issue affects the function selectNoticeList of the file com/cloudweb/oa/mapper/xml/OaNoticeMapper.xml. The manipulation of the argument sort leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.07.04",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T19:15Z",
    "lastModifiedDate" : "2025-06-05T19:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1217",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-436"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-v8xr-gpvj-cx9g",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250523-0008/",
          "name" : "https://security.netapp.com/advisory/ntap-20250523-0008/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when http request module parses HTTP response obtained from a server, folded headers are parsed incorrectly, which may lead to misinterpreting the response and using incorrect headers, MIME types, etc."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.32",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.28",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.19",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-29T06:15Z",
    "lastModifiedDate" : "2025-05-23T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1219",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-p3x9-6h7p-cgfc",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250523-0007/",
          "name" : "https://security.netapp.com/advisory/ntap-20250523-0007/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when requesting a HTTP resource using the DOM or SimpleXML extensions, the wrong content-type header is used to determine the charset when the requested resource performs a redirect. This may cause the resulting document to be parsed incorrectly or bypass validations."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.32",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.28",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.19",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-30T06:15Z",
    "lastModifiedDate" : "2025-05-23T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1220",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-3cr5-j632-f35r",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* before 8.4.10 some functions like fsockopen() lack validation that the hostname supplied does not contain null characters. This may lead to other functions like parse_url() treat the hostname in different way, thus opening way to security problems if the user code implements access checks before access using such functions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.33",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.29",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-13T23:15Z",
    "lastModifiedDate" : "2025-07-22T17:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1221",
        "ASSIGNER" : "product-security@silabs.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://community.silabs.com/068Vm00000Sadyn",
          "name" : "https://community.silabs.com/068Vm00000Sadyn",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-7.4.4.0.pdf",
          "name" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-7.4.4.0.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.0.2.0.pdf",
          "name" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.0.2.0.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.1.0.0.pdf",
          "name" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.1.0.0.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Zigbee Radio Co-Processor (RCP), which is using SiLabs EmberZNet Zigbee stack, was unable to send messages to the host system (CPCd) due to heavy Zigbee traffic, resulting in a Denial of Service (DoS) attack, Only hard reset will bring the device to normal operation"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-30T08:15Z",
    "lastModifiedDate" : "2025-07-30T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1222",
        "ASSIGNER" : "secure@citrix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.citrix.com/s/article/CTX692679-citrix-secure-access-client-for-mac-security-bulletin-for-cve20251222-and-cve20251223?language=en_US",
          "name" : "https://support.citrix.com/s/article/CTX692679-citrix-secure-access-client-for-mac-security-bulletin-for-cve20251222-and-cve20251223?language=en_US",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:citrix:secure_access_client:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.01.2",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-02-20T01:15Z",
    "lastModifiedDate" : "2025-08-06T17:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1223",
        "ASSIGNER" : "secure@citrix.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.citrix.com/s/article/CTX692679-citrix-secure-access-client-for-mac-security-bulletin-for-cve20251222-and-cve20251223?language=en_US",
          "name" : "https://support.citrix.com/s/article/CTX692679-citrix-secure-access-client-for-mac-security-bulletin-for-cve20251222-and-cve20251223?language=en_US",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker can gain application privileges in order to perform limited modification and/or read arbitrary data in Citrix Secure Access Client for Mac"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:citrix:secure_access_client:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "25.01.2",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-02-20T01:15Z",
    "lastModifiedDate" : "2025-08-06T17:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1224",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI731",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI731",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI731",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI731",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295210",
          "name" : "VDB-295210 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295210",
          "name" : "VDB-295210 | ywoa UserMapper.xml listNameBySql sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in ywoa up to 2024.07.03. This vulnerability affects the function listNameBySql of the file com/cloudweb/oa/mapper/xml/UserMapper.xml. The manipulation leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.07.04",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T20:15Z",
    "lastModifiedDate" : "2025-06-05T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1225",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-611"
          }, {
            "lang" : "en",
            "value" : "CWE-610"
          }, {
            "lang" : "en",
            "value" : "CWE-611"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI81R",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI81R",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295211",
          "name" : "VDB-295211 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295211",
          "name" : "VDB-295211 | ywoa WXCallBack Interface XMLParse.java extract xml external entity reference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in ywoa up to 2024.07.03. This issue affects the function extract of the file c-main/src/main/java/com/redmoon/weixin/aes/XMLParse.java of the component WXCallBack Interface. The manipulation leads to xml external entity reference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.07.04",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-12T20:15Z",
    "lastModifiedDate" : "2025-06-05T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1226",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-285"
          }, {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI7PG",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI7PG",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295216",
          "name" : "VDB-295216 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295216",
          "name" : "VDB-295216 | ywoa setup.jsp improper authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ywoa up to 2024.07.03. It has been declared as critical. This vulnerability affects unknown code of the file /oa/setup/setup.jsp. The manipulation leads to improper authorization. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.07.04",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-06-05T19:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1227",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
          "name" : "https://gitee.com/r1bbit/yimioa/issues/IBI7XH",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295217",
          "name" : "VDB-295217 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295217",
          "name" : "VDB-295217 | ywoa AddressDao.xml selectList sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ywoa up to 2024.07.03. It has been rated as critical. This issue affects the function selectList of the file com/cloudweb/oa/mapper/xml/AddressDao.xml. The manipulation leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2024.07.04 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yimihome:ywoa:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.07.04",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-12T21:15Z",
    "lastModifiedDate" : "2025-06-05T19:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1228",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/olajowon/loggrove/issues/IBJSXS",
          "name" : "https://gitee.com/olajowon/loggrove/issues/IBJSXS",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295218",
          "name" : "VDB-295218 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295218",
          "name" : "VDB-295218 | olajowon Loggrove Logfile Update page path traversal",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in olajowon Loggrove up to e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Affected is an unknown function of the file /read/?page=1&logfile=LOG_Monitor of the component Logfile Update Handler. The manipulation of the argument path leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-12T22:15Z",
    "lastModifiedDate" : "2025-02-12T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1229",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/olajowon/loggrove/issues/IBJT1K",
          "name" : "https://gitee.com/olajowon/loggrove/issues/IBJT1K",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295219",
          "name" : "VDB-295219 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295219",
          "name" : "VDB-295219 | olajowon Loggrove page os command injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in olajowon Loggrove up to e428fac38cc480f011afcb1d8ce6c2bad378ddd6. Affected by this vulnerability is an unknown functionality of the file /read/?page=1&logfile=eee&match=. The manipulation of the argument path leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-12T22:15Z",
    "lastModifiedDate" : "2025-02-12T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1230",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-prestashop",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-prestashop",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Stored Cross-Site Scripting (XSS) vulnerability in Prestashop 8.1.7, due to the lack of proper validation of user input through ‘/<admin_directory>/index.php’, affecting the ‘link’ parameter. This vulnerability could allow a remote user to send a specially crafted query to an authenticated user and steal their cookie session details."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T11:15Z",
    "lastModifiedDate" : "2025-02-12T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1231",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-640"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0002/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0002/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper password reset in PAM Module in Devolutions Server 2024.3.10.0 and earlier allows an authenticated user to reuse the oracle user password after check-in due to crash in the password reset functionality."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.3.11.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-11T14:15Z",
    "lastModifiedDate" : "2025-03-28T16:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1232",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/c4ea8357-ddd7-48ac-80c9-15b924715b14/",
          "name" : "https://wpscan.com/vulnerability/c4ea8357-ddd7-48ac-80c9-15b924715b14/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Site Reviews WordPress plugin before 7.2.5 does not properly sanitise and escape some of its Review fields, which could allow unauthenticated users to perform Stored XSS attacks"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:geminilabs:site_reviews:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "7.2.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-19T06:15Z",
    "lastModifiedDate" : "2025-05-09T12:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1233",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/lafka-fast-food-restaurant-woocommerce-theme/23969682",
          "name" : "https://themeforest.net/item/lafka-fast-food-restaurant-woocommerce-theme/23969682",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/865b87a8-ab8a-4054-9e18-50693023cb96?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/865b87a8-ab8a-4054-9e18-50693023cb96?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Lafka Plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'lafka_options_upload' AJAX function in all versions up to, and including, 7.1.0. This makes it possible for authenticated attackers, with subscriber-level access and above, to update the theme option that overrides the site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-05T06:15Z",
    "lastModifiedDate" : "2025-04-05T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1234",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1235",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.vde.com/en/advisories/VDE-2025-020",
          "name" : "https://cert.vde.com/en/advisories/VDE-2025-020",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A low privileged attacker can set the date of the devices to the 19th of January 2038 an therefore exceed the 32-Bit time limit. This causes the date of the switch to be set back to January 1st, 1970."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-02T07:15Z",
    "lastModifiedDate" : "2025-06-02T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1239",
        "ASSIGNER" : "security@watchguard.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00002",
          "name" : "https://www.watchguard.com/wgrd-psirt/advisory/wgsa-2025-00002",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in WatchGuard Fireware OS allows Stored XSS via the Blocked Sites list. This vulnerability requires an authenticated administrator session to a locally managed Firebox.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T14:15Z",
    "lastModifiedDate" : "2025-02-14T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1240",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-047/",
          "name" : "ZDI-25-047",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "WinZip 7Z File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of WinZip. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of 7Z files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-24986."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:winzip:winzip:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "18.0",
          "versionEndExcluding" : "18.0.16371",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:winzip:winzip:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "27.0",
          "versionEndExcluding" : "27.0.16370",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:winzip:winzip:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "76.0",
          "versionEndExcluding" : "76.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-11T22:15Z",
    "lastModifiedDate" : "2025-08-18T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1243",
        "ASSIGNER" : "security@temporal.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/temporalio/api-go/releases/tag/v1.44.1",
          "name" : "https://github.com/temporalio/api-go/releases/tag/v1.44.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://temporal.io/blog/announcing-a-new-operation-workflow-update",
          "name" : "https://temporal.io/blog/announcing-a-new-operation-workflow-update",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Temporal api-go library prior to version 1.44.1 did not send `update response` information to Data Converter when the proxy package within the api-go module was used in a gRPC proxy prior to transmission. This resulted in information contained within the `update response` field not having Data Converter transformations (e.g. encryption) applied. This is an issue only when using the UpdateWorkflowExecution APIs (released on 13th January 2025)  with a proxy leveraging the api-go library before version 1.44.1.\n\nOther data fields were correctly sent to Data Converter. This issue does not impact the Data Converter server. Data was encrypted in transit. Temporal Cloud services are not impacted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T01:15Z",
    "lastModifiedDate" : "2025-02-12T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1244",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1915",
          "name" : "RHSA-2025:1915",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1917",
          "name" : "RHSA-2025:1917",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1961",
          "name" : "RHSA-2025:1961",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1962",
          "name" : "RHSA-2025:1962",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1963",
          "name" : "RHSA-2025:1963",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1964",
          "name" : "RHSA-2025:1964",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2022",
          "name" : "RHSA-2025:2022",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2130",
          "name" : "RHSA-2025:2130",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2157",
          "name" : "RHSA-2025:2157",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2195",
          "name" : "RHSA-2025:2195",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2754",
          "name" : "RHSA-2025:2754",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1244",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1244",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2345150",
          "name" : "RHBZ#2345150",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=66390",
          "name" : "https://debbugs.gnu.org/cgi/bugreport.cgi?bug=66390",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-30.1",
          "name" : "https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-30.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/03/01/2",
          "name" : "http://www.openwall.com/lists/oss-security/2025/03/01/2",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T15:15Z",
    "lastModifiedDate" : "2025-03-13T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1245",
        "ASSIGNER" : "hirt@hitachi.co.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-116/index.html",
          "name" : "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-116/index.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Bypass Connection Restriction vulnerability in Hitachi Infrastructure Analytics Advisor (Data Center Analytics component), Hitachi Ops Center Analyzer  (Hitachi Ops Center Analyzer detail view component).This issue affects Hitachi Infrastructure Analytics Advisor:; Hitachi Ops Center Analyzer: from 10.0.0-00 before 11.0.4-00."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-16T06:15Z",
    "lastModifiedDate" : "2025-05-16T14:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1246",
        "ASSIGNER" : "arm-security@arm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://developer.arm.com/documentation/110466/latest/",
          "name" : "https://developer.arm.com/documentation/110466/latest/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Arm Ltd Bifrost GPU Userspace Driver, Arm Ltd Valhall GPU Userspace Driver, Arm Ltd Arm 5th Gen GPU Architecture Userspace Driver allows a non-privileged user process to perform valid GPU processing operations, including via WebGL or WebGPU, to access outside of buffer bounds.This issue affects Bifrost GPU Userspace Driver: from r18p0 through r49p3, from r50p0 through r51p0; Valhall GPU Userspace Driver: from r28p0 through r49p3, from r50p0 through r54p0; Arm 5th Gen GPU Architecture Userspace Driver: from r41p0 through r49p3, from r50p0 through r54p0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r41p0",
          "versionEndExcluding" : "r49p4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:5th_gen_gpu_architecture_userspace_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndExcluding" : "r54p1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r48p0",
          "versionEndExcluding" : "r49p4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r50p0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:bifrost_gpu_userspace_driver:r51p0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r28p0",
          "versionEndExcluding" : "r49p4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:arm:valhall_gpu_userspace_driver:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "r50p0",
          "versionEndExcluding" : "r54p1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T11:15Z",
    "lastModifiedDate" : "2025-07-02T21:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1247",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1884",
          "name" : "RHSA-2025:1884",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1885",
          "name" : "RHSA-2025:1885",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2067",
          "name" : "RHSA-2025:2067",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1247",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1247",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2345172",
          "name" : "RHBZ#2345172",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in Quarkus REST that allows request parameters to leak between concurrent requests if endpoints use field injection without a CDI scope. This vulnerability allows attackers to manipulate request data, impersonate users, or access sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T14:16Z",
    "lastModifiedDate" : "2025-03-03T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1249",
        "ASSIGNER" : "audit@patchstack.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://patchstack.com/database/wordpress/plugin/events-manager/vulnerability/wordpress-events-manager-plugin-6-6-4-1-broken-access-control-vulnerability?_s_id=cve",
          "name" : "https://patchstack.com/database/wordpress/plugin/events-manager/vulnerability/wordpress-events-manager-plugin-6-6-4-1-broken-access-control-vulnerability?_s_id=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing Authorization vulnerability in Pixelite Events Manager allows Exploiting Incorrectly Configured Access Control Security Levels.This issue affects Events Manager: from n/a through 6.6.4.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T15:15Z",
    "lastModifiedDate" : "2025-02-26T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1252",
        "ASSIGNER" : "security@rti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rti.com/vulnerabilities/#cve-2025-1252",
          "name" : "https://www.rti.com/vulnerabilities/#cve-2025-1252",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.4d before 5.2.*."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.4",
          "versionEndIncluding" : "5.2.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.3.0",
          "versionEndIncluding" : "5.3.1.45",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndIncluding" : "6.0.1.40",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.1.0",
          "versionEndExcluding" : "6.1.2.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.3.0.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.5.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-05-08T09:15Z",
    "lastModifiedDate" : "2025-07-31T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1253",
        "ASSIGNER" : "security@rti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rti.com/vulnerabilities/#cve-2025-1253",
          "name" : "https://www.rti.com/vulnerabilities/#cve-2025-1253",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Buffer Copy without Checking Size of Input ('Classic Buffer Overflow'), Stack-based Buffer Overflow vulnerability in RTI Connext Professional (Core Libraries) allows Overflow Variables and Tags.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42, from 5.3.0 before 5.3.*, from 4.5c before 5.2.*."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.3.0",
          "versionEndIncluding" : "5.3.1.45",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndIncluding" : "6.0.1.40",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.1.0",
          "versionEndExcluding" : "6.1.2.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.3.0.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.5.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.5c",
          "versionEndIncluding" : "5.2.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-08T09:15Z",
    "lastModifiedDate" : "2025-07-31T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1254",
        "ASSIGNER" : "security@rti.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rti.com/vulnerabilities/#cve-2025-1254",
          "name" : "https://www.rti.com/vulnerabilities/#cve-2025-1254",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds Read, Out-of-bounds Write vulnerability in RTI Connext Professional (Recording Service) allows Overflow Buffers, Overread Buffers.This issue affects Connext Professional: from 7.4.0 before 7.5.0, from 7.0.0 before 7.3.0.7, from 6.1.0 before 6.1.2.23, from 6.0.0 before 6.0.1.42."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndIncluding" : "6.0.1.40",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.1.0",
          "versionEndExcluding" : "6.1.2.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.3.0.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rti:connext_professional:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.4.0",
          "versionEndExcluding" : "7.5.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-05-08T09:15Z",
    "lastModifiedDate" : "2025-07-31T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1257",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/519348",
          "name" : "GitLab Issue #519348",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2984218",
          "name" : "HackerOne Bug Bounty Report #2984218",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue was discovered in GitLab EE affecting all versions starting with 12.3 before 17.7.7, 17.8 prior to 17.8.5, and 17.9 prior to 17.9.2. A vulnerability in certain GitLab instances could allow an attacker to cause a denial of service condition by manipulating specific API inputs."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "12.3.0",
          "versionEndExcluding" : "17.7.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-13T06:15Z",
    "lastModifiedDate" : "2025-08-08T01:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1258",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T18:15Z",
    "lastModifiedDate" : "2025-02-20T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1259",
        "ASSIGNER" : "psirt@arista.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111",
          "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in users retrieving data that should not have been available"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T20:15Z",
    "lastModifiedDate" : "2025-03-04T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1260",
        "ASSIGNER" : "psirt@arista.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111",
          "name" : "https://www.arista.com/en/support/advisories-notices/security-advisory/21098-security-advisory-0111",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On affected platforms running Arista EOS with OpenConfig configured, a gNOI request can be run when it should have been rejected. This issue can result in unexpected configuration/operations being applied to the switch."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T20:15Z",
    "lastModifiedDate" : "2025-03-04T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1261",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3249106/ht-mega-for-elementor/tags/2.8.3/assets/js/htmega-widgets-active.js",
          "name" : "https://plugins.trac.wordpress.org/changeset/3249106/ht-mega-for-elementor/tags/2.8.3/assets/js/htmega-widgets-active.js",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e553135d-88e0-4840-99ad-9514c2243b7d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e553135d-88e0-4840-99ad-9514c2243b7d?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to DOM-Based Stored Cross-Site Scripting via the plugin's Countdown widget in all versions up to, and including, 2.8.2 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. NOTE: This vulnerability exists due to an incomplete fix for CVE-2024-3307."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*",
          "versionEndIncluding" : "2.8.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-08T02:15Z",
    "lastModifiedDate" : "2025-03-24T18:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1262",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-804"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3244677/advanced-google-recaptcha",
          "name" : "https://plugins.trac.wordpress.org/changeset/3244677/advanced-google-recaptcha",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d553aab2-d441-46d6-9c01-5dcfdc48674f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d553aab2-d441-46d6-9c01-5dcfdc48674f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Advanced Google reCaptcha plugin for WordPress is vulnerable to CAPTCHA Bypass in versions up to, and including, 1.27 . This makes it possible for unauthenticated attackers to bypass the Built-in Math Captcha Verification."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webfactoryltd:advanced_google_recaptcha:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.2.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-25T13:15Z",
    "lastModifiedDate" : "2025-02-28T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1264",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Api/Api.php#L42",
          "name" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Api/Api.php#L42",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Api/LinkStatusTable.php#L31",
          "name" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Api/LinkStatusTable.php#L31",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Core/Database.php#L1357",
          "name" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Core/Database.php#L1357",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Core/Database.php#L552",
          "name" : "https://plugins.trac.wordpress.org/browser/broken-link-checker-seo/trunk/app/Core/Database.php#L552",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3263416%40broken-link-checker-seo&new=3263416%40broken-link-checker-seo&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3263416%40broken-link-checker-seo&new=3263416%40broken-link-checker-seo&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/broken-link-checker-seo",
          "name" : "https://wordpress.org/plugins/broken-link-checker-seo",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2d582e-4f50-4b55-9f3b-3c46d96c0927?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ce2d582e-4f50-4b55-9f3b-3c46d96c0927?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Broken Link Checker by AIOSEO – Easily Fix/Monitor Internal and External links plugin for WordPress is vulnerable to SQL Injection via the 'orderBy' parameter in all versions up to, and including, 1.2.3 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-06T05:15Z",
    "lastModifiedDate" : "2025-04-06T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1265",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://elseta.com/support/",
          "name" : "https://elseta.com/support/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-051-06",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-051-06",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An OS command injection vulnerability exists in Vinci Protocol Analyzer that could allow an attacker to escalate privileges and perform code execution on affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T20:15Z",
    "lastModifiedDate" : "2025-02-20T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1266",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T22:15Z",
    "lastModifiedDate" : "2025-03-13T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1267",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/groundhoggwp/groundhogg/commit/5206bf2482e2fe210ccca6e7dcfe62ffe85b3061",
          "name" : "https://github.com/groundhoggwp/groundhogg/commit/5206bf2482e2fe210ccca6e7dcfe62ffe85b3061",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/groundhogg/trunk/assets/js/admin/forms/form-builder-v2.js",
          "name" : "https://plugins.trac.wordpress.org/browser/groundhogg/trunk/assets/js/admin/forms/form-builder-v2.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/groundhogg/trunk/assets/js/admin/forms/form-builder-v2.js#L859",
          "name" : "https://plugins.trac.wordpress.org/browser/groundhogg/trunk/assets/js/admin/forms/form-builder-v2.js#L859",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3264477/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3264477/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/763a9aff-9bc0-4c79-9383-778a9034b436?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/763a9aff-9bc0-4c79-9383-778a9034b436?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Groundhogg plugin for Wordpress is vulnerable to Stored Cross-Site Scripting via the ‘label' parameter in versions up to, and including, 3.7.4.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Administrator-level access, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-01T07:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1268",
        "ASSIGNER" : "canon@example.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://canon.jp/support/support-info/250328vulnerability-response",
          "name" : "https://canon.jp/support/support-info/250328vulnerability-response",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://psirt.canon/advisory-information/cp2025-003/",
          "name" : "https://psirt.canon/advisory-information/cp2025-003/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.canon-europe.com/support/product-security/",
          "name" : "https://www.canon-europe.com/support/product-security/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.usa.canon.com/about-us/to-our-customers/service-notice-vulnerability-remediation-for-certain-printer-drivers-for-production-printers-office-small-office-multifunction-printers-and-laser-printers",
          "name" : "https://www.usa.canon.com/about-us/to-our-customers/service-notice-vulnerability-remediation-for-certain-printer-drivers-for-production-printers-office-small-office-multifunction-printers-and-laser-printers",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds vulnerability in EMF Recode processing of Generic Plus PCL6 Printer Driver / Generic Plus UFR II Printer Driver / Generic Plus LIPS4 Printer Driver / Generic Plus LIPSLX Printer Driver / Generic Plus PS Printer Driver / Generic FAX Printer Driver / UFRII LT Printer Driver / CARPS2 Printer Driver / PDF Driver"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-31T02:15Z",
    "lastModifiedDate" : "2025-06-16T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1269",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/limanmys/core/releases/tag/release.master.1010",
          "name" : "https://github.com/limanmys/core/releases/tag/release.master.1010",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0038",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0038",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "URL Redirection to Untrusted Site ('Open Redirect') vulnerability in HAVELSAN Liman MYS allows Cross-Site Flashing.This issue affects Liman MYS: before 2.1.1 - 1010."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:R/S:C/C:L/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-18T14:15Z",
    "lastModifiedDate" : "2025-02-18T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1270",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insecure direct object reference (IDOR) vulnerability in Anapi Group's h6web, allows an authenticated attacker to access other users' information by making a POST request and modifying the “pkrelated” parameter in the “/h6web/ha_datos_hermano.php” endpoint to refer to another user. In addition, the first request could also allow the attacker to impersonate other users. As a result, all requests made after exploitation of the IDOR vulnerability will be executed with the privileges of the impersonated user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T13:15Z",
    "lastModifiedDate" : "2025-02-13T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1271",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-anapi-group-h6web",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Reflected Cross-Site Scripting (XSS) in Anapi Group's h6web. This security flaw could allow an attacker to inject malicious JavaScript code into a URL. When a user accesses that URL, the injected code is executed in their browser, which can result in the theft of sensitive information, identity theft or the execution of unauthorised actions on behalf of the affected user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-13T13:15Z",
    "lastModifiedDate" : "2025-02-13T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1273",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-15T21:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1274",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0007",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0007",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted RCS file, when parsed through Autodesk Revit, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-15T21:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1275",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/products/dwg-trueview/overview",
          "name" : "https://www.autodesk.com/products/dwg-trueview/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0006",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0006",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted JPG file, when linked or imported into certain Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-15T21:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1276",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/products/dwg-trueview/overview",
          "name" : "https://www.autodesk.com/products/dwg-trueview/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0004",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0004",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DWG file, when parsed through certain Autodesk applications, can force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data corruption, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:-:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:-:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:-:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:-:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:-:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_lt:*:*:*:*:*:-:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:dwg_trueview:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:infrastructure_parts_editor:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:inventor:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks_manage:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks_manage:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks_simulate:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks_simulate:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:vault:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:vault:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-15T21:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1277",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PDF file, when parsed through Autodesk applications, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-15T21:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1278",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-1220"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/519580",
          "name" : "GitLab Issue #519580",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2977149",
          "name" : "HackerOne Bug Bounty Report #2977149",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 12.0 before 17.9.8, 17.10 before 17.10.6, and 17.11 before 17.11.2. Under certain conditions users could bypass IP access restrictions and view sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndExcluding" : "17.9.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndExcluding" : "17.9.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-09T17:15Z",
    "lastModifiedDate" : "2025-08-08T18:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1279",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/art-simple-clean-wordpress-theme-for-creatives/20170299",
          "name" : "https://themeforest.net/item/art-simple-clean-wordpress-theme-for-creatives/20170299",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4632899-c3bf-48f3-8a69-8fa32bfd902d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e4632899-c3bf-48f3-8a69-8fa32bfd902d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the ux_cb_tools_import_item_ajax AJAX action in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-25T09:15Z",
    "lastModifiedDate" : "2025-04-25T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1282",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          }, {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708?s_rank=7",
          "name" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708?s_rank=7",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf4b588-8b67-425a-b0e1-d4382cb88dd1?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/edf4b588-8b67-425a-b0e1-d4382cb88dd1?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Car Dealer Automotive WordPress Theme – Responsive theme for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the delete_post_photo() and add_car() functions in all versions up to, and including, 1.6.3. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php). The add_car() function may also make it possible to read arbitrary files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:thememakers:car_dealer_automotive:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.6.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-27T09:15Z",
    "lastModifiedDate" : "2025-03-11T16:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1283",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-18",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-044-18",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "US Government Resource" ]
        }, {
          "url" : "https://www.dingtian-tech.com/en_us/aboutus.html?tab=contact_us",
          "name" : "https://www.dingtian-tech.com/en_us/aboutus.html?tab=contact_us",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Dingtian DT-R0 Series is vulnerable to an exploit that allows \nattackers to bypass login requirements by directly navigating to the \nmain page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dingtian-tech:dt-r002_firmware:3.1.3044a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dingtian-tech:dt-r002:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dingtian-tech:dt-r008_firmware:3.1.1759a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dingtian-tech:dt-r008:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dingtian-tech:dt-r016_firmware:3.1.2776a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dingtian-tech:dt-r016:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dingtian-tech:dt-r032_firmware:3.1.3826a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dingtian-tech:dt-r032:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-13T22:15Z",
    "lastModifiedDate" : "2025-04-10T18:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1284",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/woocommerce-google-cloud-print/21129093",
          "name" : "https://codecanyon.net/item/woocommerce-google-cloud-print/21129093",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f593dce-4b56-46c0-becd-75fd16f165a8?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6f593dce-4b56-46c0-becd-75fd16f165a8?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Woocommerce Automatic Order Printing | ( Formerly WooCommerce Google Cloud Print) plugin for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 4.1 via the xc_woo_printer_preview AJAX action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to view other user's invoices and orders which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-24T09:15Z",
    "lastModifiedDate" : "2025-04-24T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1285",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/resido-real-estate-wordpress-theme/31804443",
          "name" : "https://themeforest.net/item/resido-real-estate-wordpress-theme/31804443",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3512ce8f-b7a6-4a6f-a141-bca08c183882?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3512ce8f-b7a6-4a6f-a141-bca08c183882?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Resido - Real Estate WordPress Theme theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the delete_api_key and save_api_key AJAX actions in all versions up to, and including, 3.6. This makes it possible for unauthenticated attackers to issue requests to internal services and update API key details."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-14T05:15Z",
    "lastModifiedDate" : "2025-03-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1286",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/c42556c7-09b6-49ae-9f87-cbaf16e7c280/",
          "name" : "https://wpscan.com/vulnerability/c42556c7-09b6-49ae-9f87-cbaf16e7c280/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/c42556c7-09b6-49ae-9f87-cbaf16e7c280/",
          "name" : "https://wpscan.com/vulnerability/c42556c7-09b6-49ae-9f87-cbaf16e7c280/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Download HTML TinyMCE Button WordPress plugin through 1.2 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sfarbota:download_html_tinymce_button:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-06-12T16:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1287",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.2.0/modules/widgets/tp_countdown.php#L1868",
          "name" : "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.2.0/modules/widgets/tp_countdown.php#L1868",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.2.0/modules/widgets/tp_page_scroll.php#L1015",
          "name" : "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.2.0/modules/widgets/tp_page_scroll.php#L1015",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.2.0/modules/widgets/tp_syntax_highlighter.php#L1043",
          "name" : "https://plugins.trac.wordpress.org/browser/the-plus-addons-for-elementor-page-builder/tags/6.2.0/modules/widgets/tp_syntax_highlighter.php#L1043",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3252092/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3252092/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbf86da7-621d-4fb7-ba16-d132db5b602a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fbf86da7-621d-4fb7-ba16-d132db5b602a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The The Plus Addons for Elementor – Elementor Addons, Page Templates, Widgets, Mega Menu, WooCommerce plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Countdown, Syntax Highlighter, and Page Scroll widgets in all versions up to, and including, 6.2.2 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:posimyth:the_plus_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "6.2.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-08T09:15Z",
    "lastModifiedDate" : "2025-03-24T18:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1288",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/175af35d-6972-42c9-b7ac-913ce1fbac64/",
          "name" : "https://wpscan.com/vulnerability/175af35d-6972-42c9-b7ac-913ce1fbac64/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/175af35d-6972-42c9-b7ac-913ce1fbac64/",
          "name" : "https://wpscan.com/vulnerability/175af35d-6972-42c9-b7ac-913ce1fbac64/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WOOEXIM  WordPress plugin through 5.0.0 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make an unauthenticated user vulnerable to reflected XSS via a CSRF attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bulktheme:wooexim:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "5.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-06-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1289",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/5a296b59-f305-49a2-88b8-fca998f2c43e/",
          "name" : "https://wpscan.com/vulnerability/5a296b59-f305-49a2-88b8-fca998f2c43e/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/5a296b59-f305-49a2-88b8-fca998f2c43e/",
          "name" : "https://wpscan.com/vulnerability/5a296b59-f305-49a2-88b8-fca998f2c43e/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Plugin Oficial  WordPress plugin through 1.7.3 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:coffee-code:plugin_oficial:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-08-01T01:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1290",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/301886931",
          "name" : "https://issues.chromium.org/issues/b/301886931",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://issuetracker.google.com/issues/301886931",
          "name" : "https://issuetracker.google.com/issues/301886931",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Mailing List" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A race condition Use-After-Free vulnerability exists in the virtio_transport_space_update function within the Kernel 5.4 on ChromeOS. Concurrent allocation and freeing of the virtio_vsock_sock structure \nduring an AF_VSOCK connect syscall can occur before a worker thread accesses it resulting in a dangling pointer and potential kernel code execution."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:google:chrome_os:15474.84.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:5.4:-:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-17T01:15Z",
    "lastModifiedDate" : "2025-07-11T13:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1291",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php#L219",
          "name" : "https://plugins.trac.wordpress.org/browser/kadence-blocks/trunk/includes/blocks/class-kadence-blocks-testimonial-block.php#L219",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246675/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246675/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9df00907-c95e-445c-b424-78a1e5e00e4f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9df00907-c95e-445c-b424-78a1e5e00e4f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Gutenberg Blocks with AI by Kadence WP – Page Builder Features plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘icon’ parameter in all versions up to, and including, 3.4.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-01T09:15Z",
    "lastModifiedDate" : "2025-03-01T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1292",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/324336238",
          "name" : "https://issues.chromium.org/issues/b/324336238",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://issuetracker.google.com/issues/324336238",
          "name" : "https://issuetracker.google.com/issues/324336238",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-Of-Bounds Write in TPM2 Reference Library in Google ChromeOS 122.0.6261.132  stable on Cr50 Boards allows an attacker with root access to gain persistence and \nbypass operating system verification via exploiting the NV_Read functionality during the Challenge-Response process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-15T20:15Z",
    "lastModifiedDate" : "2025-04-17T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1293",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-03-hashicorp-hermes-improperly-validates-aws-alb-jwts-which-may-lead-to-authentication-bypass/73371",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-03-hashicorp-hermes-improperly-validates-aws-alb-jwts-which-may-lead-to-authentication-bypass/73371",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Hermes versions up to 0.4.0 improperly validated the JWT provided when using the AWS ALB authentication mode, potentially allowing for authentication bypass. This vulnerability, CVE-2025-1293, was fixed in Hermes 0.5.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T01:15Z",
    "lastModifiedDate" : "2025-02-20T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1294",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://codecanyon.net/item/eform-wordpress-form-builder/3180835",
          "name" : "https://codecanyon.net/item/eform-wordpress-form-builder/3180835",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://eform.live/changelog/",
          "name" : "https://eform.live/changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c5db375-e865-47ba-a3dd-462c55d066fd?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6c5db375-e865-47ba-a3dd-462c55d066fd?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The eForm - WordPress Form Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 4.18.0 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-24T23:15Z",
    "lastModifiedDate" : "2025-04-24T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1295",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-269"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://localhost:1337/wp-content/plugins/templines-helper-core/youzify/youzify.php#L3082",
          "name" : "http://localhost:1337/wp-content/plugins/templines-helper-core/youzify/youzify.php#L3082",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c5aa062-b9a2-4ddb-a5bf-4c8368218e85?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/8c5aa062-b9a2-4ddb-a5bf-4c8368218e85?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Templines Elementor Helper Core plugin for WordPress is vulnerable to privilege escalation in all versions up to, and including, 2.7. This is due to allowing arbitrary user meta updates. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update their role to Administrator. The vulnerability can only be exploited when the BuddyPress plugin is also installed and activated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-27T06:15Z",
    "lastModifiedDate" : "2025-02-27T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1296",
        "ASSIGNER" : "security@hashicorp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://discuss.hashicorp.com/t/hcsec-2025-04-nomad-exposes-sensitive-workload-identity-and-client-secret-token-in-audit-logs/73737",
          "name" : "https://discuss.hashicorp.com/t/hcsec-2025-04-nomad-exposes-sensitive-workload-identity-and-client-secret-token-in-audit-logs/73737",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Nomad Community and Nomad Enterprise (“Nomad”) are vulnerable to unintentional exposure of the workload identity token and client secret token in audit logs. This vulnerability, identified as CVE-2025-1296, is fixed in Nomad Community Edition 1.9.7 and Nomad Enterprise 1.9.7, 1.8.11, and 1.7.19."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-10T18:15Z",
    "lastModifiedDate" : "2025-03-10T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1297",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1298",
        "ASSIGNER" : "security.tecno@tecno-mobile.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.tecno.com/SRC/blogdetail/383?lang=en_US",
          "name" : "https://security.tecno.com/SRC/blogdetail/383?lang=en_US",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.tecno.com/SRC/securityUpdates",
          "name" : "https://security.tecno.com/SRC/securityUpdates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Logic vulnerability in the mobile application (com.transsion.carlcare) may lead to the risk of account takeover."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-14T08:15Z",
    "lastModifiedDate" : "2025-02-18T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1299",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/519696",
          "name" : "GitLab Issue #519696",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2969145",
          "name" : "HackerOne Bug Bounty Report #2969145",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions starting from 15.4 before 18.0.5, all versions starting from 18.1 before 18.1.3, all versions starting from 18.2 before 18.2.1 that, under circumstances, could have allowed an unauthorized user to read deployment job logs by sending a crafted request."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "15.4",
          "versionEndExcluding" : "18.0.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "15.4",
          "versionEndExcluding" : "18.0.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.2:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.2:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-07-24T07:15Z",
    "lastModifiedDate" : "2025-07-28T13:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1300",
        "ASSIGNER" : "psirt@ericsson.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Ericsson/codechecker/security/advisories/GHSA-g839-x3p3-g5fm",
          "name" : "https://github.com/Ericsson/codechecker/security/advisories/GHSA-g839-x3p3-g5fm",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CodeChecker is an analyzer tooling, defect database and viewer extension for the Clang Static Analyzer and Clang Tidy. \n\nThe CodeChecker web server contains an open redirect vulnerability due to missing protections against multiple slashes after the product name in the URL. This results in bypassing the protections against CVE-2021-28861, leading to the same open redirect pathway.\n\nThis issue affects CodeChecker: through 6.24.5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T13:15Z",
    "lastModifiedDate" : "2025-02-28T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1301",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0100",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0100",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Yordam Informatics Library Automation System allows Reflected XSS.This issue affects Library Automation System: before 21.6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yordam:library_automation_system:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "21.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-02T11:15Z",
    "lastModifiedDate" : "2025-05-07T16:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1302",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/nickcopi/11ba3cb4fdee6f89e02e6afae8db6456",
          "name" : "https://gist.github.com/nickcopi/11ba3cb4fdee6f89e02e6afae8db6456",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JSONPath-Plus/JSONPath/blob/8e4acf8aff5f446aa66323e12394ac5615c3b260/src/Safe-Script.js%23L127",
          "name" : "https://github.com/JSONPath-Plus/JSONPath/blob/8e4acf8aff5f446aa66323e12394ac5615c3b260/src/Safe-Script.js%23L127",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/JSONPath-Plus/JSONPath/commit/30942896d27cb8a806b965a5ca9ef9f686be24ee",
          "name" : "https://github.com/JSONPath-Plus/JSONPath/commit/30942896d27cb8a806b965a5ca9ef9f686be24ee",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-8719585",
          "name" : "https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-8719585",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package jsonpath-plus before 10.3.0 are vulnerable to Remote Code Execution (RCE) due to improper input sanitization. An attacker can execute aribitrary code on the system by exploiting the unsafe default usage of eval='safe' mode.\r\r**Note:**\r\rThis is caused by an incomplete fix for [CVE-2024-21534](https://security.snyk.io/vuln/SNYK-JS-JSONPATHPLUS-7945884)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-15T05:15Z",
    "lastModifiedDate" : "2025-02-15T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1303",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/35181798-4f21-4c8d-bb6e-61eb13683a74/",
          "name" : "https://wpscan.com/vulnerability/35181798-4f21-4c8d-bb6e-61eb13683a74/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/35181798-4f21-4c8d-bb6e-61eb13683a74/",
          "name" : "https://wpscan.com/vulnerability/35181798-4f21-4c8d-bb6e-61eb13683a74/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Plugin Oficial  WordPress plugin through 1.7.3 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against only unauthenticated users."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:coffee-code:plugin_oficial:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-08-01T01:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1304",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2.5.5/functions.php?annotate=blame&rev=269615#file2",
          "name" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2.5.5/functions.php?annotate=blame&rev=269615#file2",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L440",
          "name" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L440",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L461",
          "name" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L461",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L470",
          "name" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L470",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/85cea6b5-d57b-495e-a504-a0c1ba691637?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/85cea6b5-d57b-495e-a504-a0c1ba691637?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The NewsBlogger theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check on the newsblogger_install_and_activate_plugin() function in all versions up to, and including, 0.2.5.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:spicethemes:newsblogger:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "0.2.5.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-01T04:16Z",
    "lastModifiedDate" : "2025-05-06T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1305",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L440",
          "name" : "https://themes.trac.wordpress.org/browser/newsblogger/0.2/functions.php#L440",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=269615%40newsblogger&new=269615%40newsblogger&sfp_email=&sfph_mail=",
          "name" : "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=269615%40newsblogger&new=269615%40newsblogger&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2cac27-4a36-490f-b2d8-3c6f32843a38?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7b2cac27-4a36-490f-b2d8-3c6f32843a38?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The NewsBlogger theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 0.2.5.4. This is due to missing or incorrect nonce validation on the newsblogger_install_and_activate_plugin() function. This makes it possible for unauthenticated attackers to upload arbitrary files and achieve remote code execution via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:spicethemes:newsblogger:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "0.2.5.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-01T04:16Z",
    "lastModifiedDate" : "2025-05-06T15:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1306",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486",
          "name" : "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=",
          "name" : "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c507681-61e9-4bf0-8fe5-e2f401a7a8be?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1c507681-61e9-4bf0-8fe5-e2f401a7a8be?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Newscrunch theme for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.8.4. This is due to missing or incorrect nonce validation on the newscrunch_install_and_activate_plugin() function. This makes it possible for unauthenticated attackers to upload arbitrary files via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:spicethemes:newscrunch:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.4.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T05:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1307",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486",
          "name" : "https://themes.trac.wordpress.org/browser/newscrunch/1.8.3/functions.php#L486",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=",
          "name" : "https://themes.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=261789%40newscrunch&new=261789%40newscrunch&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b55567e9-24e6-4738-b7f7-b95b541e6067?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b55567e9-24e6-4738-b7f7-b95b541e6067?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Newscrunch theme for WordPress is vulnerable to arbitrary file uploads due to a missing capability check in the newscrunch_install_and_activate_plugin() function in all versions up to, and including, 1.8.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:spicethemes:newscrunch:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.4.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T05:15Z",
    "lastModifiedDate" : "2025-03-04T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1308",
        "ASSIGNER" : "psirt@purestorage.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.purestorage.com/Pure_Security",
          "name" : "https://support.purestorage.com/Pure_Security",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in PX Backup whereby sensitive information may be logged under specific conditions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-19T22:15Z",
    "lastModifiedDate" : "2025-05-19T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1309",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/uipress-lite/tags/3.5.00/admin/core/ajax-functions.php#L625",
          "name" : "https://plugins.trac.wordpress.org/browser/uipress-lite/tags/3.5.00/admin/core/ajax-functions.php#L625",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3249865/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3249865/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6754ba34-0dc7-40a5-9548-a5f77db0df53?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6754ba34-0dc7-40a5-9548-a5f77db0df53?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The UiPress lite | Effortless custom dashboards, admin themes and pages plugin for WordPress is vulnerable to unauthorized modification of data that can lead to privilege escalation due to a missing capability check on the uip_save_form_as_option() function in all versions up to, and including, 3.5.04. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update arbitrary options on the WordPress site. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-07T08:15Z",
    "lastModifiedDate" : "2025-03-07T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1310",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/job-postings/tags/2.7.11/include/class-job-get-uploaded-file.php#L91",
          "name" : "https://plugins.trac.wordpress.org/browser/job-postings/tags/2.7.11/include/class-job-get-uploaded-file.php#L91",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257145%40job-postings&new=3257145%40job-postings&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257145%40job-postings&new=3257145%40job-postings&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/408312d3-9a9e-4b6b-9991-aee6b77745b2?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/408312d3-9a9e-4b6b-9991-aee6b77745b2?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Jobs for WordPress plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.7.11 via the 'job_postings_get_file' parameter. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-26T10:15Z",
    "lastModifiedDate" : "2025-03-26T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1311",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wcfm-marketplace-rest-api/trunk/includes/api/class-api-deliveries-controller.php#L303",
          "name" : "https://plugins.trac.wordpress.org/browser/wcfm-marketplace-rest-api/trunk/includes/api/class-api-deliveries-controller.php#L303",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wcfm-marketplace-rest-api/",
          "name" : "https://wordpress.org/plugins/wcfm-marketplace-rest-api/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ff5cda2-edcd-4fa5-9c8e-427a43802ed1?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6ff5cda2-edcd-4fa5-9c8e-427a43802ed1?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WooCommerce Multivendor Marketplace – REST API plugin for WordPress is vulnerable to SQL Injection via the 'id' parameter in the update_delivery_status() function in all versions up to, and including, 1.6.2 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-22T07:15Z",
    "lastModifiedDate" : "2025-03-22T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1312",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/call-to-action/block.php#L32",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/blocks/call-to-action/block.php#L32",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3260377/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3260377/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac422162-be05-4420-9877-d6d41b83e881?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ac422162-be05-4420-9877-d6d41b83e881?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Blocks – WordPress Blocks Plugin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'buttonTextColor’ parameter in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T12:15Z",
    "lastModifiedDate" : "2025-03-26T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1313",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/nokri-job-board-wordpress-theme/22677241",
          "name" : "https://themeforest.net/item/nokri-job-board-wordpress-theme/22677241",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/507c2abd-47d3-4a28-a9b7-a1ad9b026e7d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/507c2abd-47d3-4a28-a9b7-a1ad9b026e7d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Nokri - Job Board WordPress Theme theme for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 1.6.3. This is due to the plugin not properly validating a user's identity prior to updating their details like email address. This makes it possible for authenticated attackers, with Subscriber-level access and above, to change arbitrary user's email addresses, including administrators, and leverage that to reset the user's password and gain access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-12T06:15Z",
    "lastModifiedDate" : "2025-07-12T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1314",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php#L1014",
          "name" : "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php#L1014",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php#L810",
          "name" : "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php#L810",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php#L833",
          "name" : "https://plugins.trac.wordpress.org/browser/custom-twitter-feeds/trunk/custom-twitter-feed.php#L833",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3254840/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3254840/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/custom-twitter-feeds/#developers",
          "name" : "https://wordpress.org/plugins/custom-twitter-feeds/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/28d47605-ecb8-42cc-901a-3cf07b946877?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/28d47605-ecb8-42cc-901a-3cf07b946877?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Custom Twitter Feeds – A Tweets Widget or X Feed Widget plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.2.5. This is due to missing or incorrect nonce validation on the ctf_clear_cache_admin() function. This makes it possible for unauthenticated attackers to reset the plugin's cache via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-20T06:15Z",
    "lastModifiedDate" : "2025-03-20T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1315",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          }, {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/injob-job-board-wordpress-theme/20322987",
          "name" : "https://themeforest.net/item/injob-job-board-wordpress-theme/20322987",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e49c7b2a-5241-4762-b7c9-c33b1ac4a668?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e49c7b2a-5241-4762-b7c9-c33b1ac4a668?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The InWave Jobs plugin for WordPress is vulnerable to privilege escalation via password reset in all versions up to, and including, 3.5.1. This is due to the plugin not properly validating a user's identity prior to updating their password. This makes it possible for unauthenticated attackers to change arbitrary user's passwords, including administrators, and leverage that to gain access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sfwebservice:injob:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "3.5.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-07T09:15Z",
    "lastModifiedDate" : "2025-03-13T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1316",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-08",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-08",
          "refsource" : "",
          "tags" : [ "Mitigation", "Third Party Advisory", "US Government Resource" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Edimax IC-7100 does not properly neutralize requests. An attacker can create specially crafted requests to achieve remote code execution on the device"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:edimax:ic-7100_firmware:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:edimax:ic-7100:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T00:15Z",
    "lastModifiedDate" : "2025-03-25T16:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1317",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1318",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1319",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3247059/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3247059/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/site-mailer/#developers",
          "name" : "https://wordpress.org/plugins/site-mailer/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9fe3574-f338-474c-af78-f843501d422c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9fe3574-f338-474c-af78-f843501d422c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Site Mailer – SMTP Replacement, Email API Deliverability & Email Log plugin for WordPress is vulnerable to Stored Cross-Site Scripting in all versions up to, and including, 1.2.3 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:elementor:site_mailer:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.2.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T13:15Z",
    "lastModifiedDate" : "2025-03-06T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1320",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/teachpress/",
          "name" : "https://wordpress.org/plugins/teachpress/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b677ad8b-4f01-4147-bcf6-ae769046be48?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b677ad8b-4f01-4147-bcf6-ae769046be48?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The teachPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 9.0.9. This is due to missing or incorrect nonce validation on the import.php page. This makes it possible for unauthenticated attackers to delete imports via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mtrv:teachpress:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "9.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-25T07:15Z",
    "lastModifiedDate" : "2025-08-11T14:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1321",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3246754%40teachpress&new=3246754%40teachpress&sfp_email=&sfph_mail=#file6",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3246754%40teachpress&new=3246754%40teachpress&sfp_email=&sfph_mail=#file6",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb453fe3-ba89-437c-b3fb-9ec207eaa9f0?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cb453fe3-ba89-437c-b3fb-9ec207eaa9f0?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The teachPress plugin for WordPress is vulnerable to SQL Injection via the 'order' parameter of the 'tpsearch' shortcode in all versions up to, and including, 9.0.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Contributor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mtrv:teachpress:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "9.0.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1322",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          }, {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/rcl-chat/core.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/rcl-chat/core.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c667be65-e6d3-40e1-aeec-384d309fde3d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c667be65-e6d3-40e1-aeec-384d309fde3d?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 16.26.10 via the 'feed' shortcode due to insufficient restrictions on which posts can be included. This makes it possible for unauthenticated attackers to view data from password protected, private, or draft posts that they should not have access to."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "16.26.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-08T10:15Z",
    "lastModifiedDate" : "2025-03-13T13:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1323",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/rcl-chat/core.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/rcl-chat/core.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae5b4d81-c2f1-4d0d-b7b0-5556bf0451f5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae5b4d81-c2f1-4d0d-b7b0-5556bf0451f5?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to SQL Injection via the 'databeat' parameter in all versions up to, and including, 16.26.10 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "16.26.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-08T10:15Z",
    "lastModifiedDate" : "2025-03-12T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1324",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/publicpost/shortcodes.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/publicpost/shortcodes.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e0be093-d61a-4634-ba9b-91dd7328e8cd?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e0be093-d61a-4634-ba9b-91dd7328e8cd?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'public-form' shortcode in all versions up to, and including, 16.26.10 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "16.26.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-08T10:15Z",
    "lastModifiedDate" : "2025-03-24T18:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1325",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/publicpost/functions-ajax.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250094/wp-recall/trunk/add-on/publicpost/functions-ajax.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad3b9040-05ed-452d-9b3f-26d1a93c62ba?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ad3b9040-05ed-452d-9b3f-26d1a93c62ba?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP-Recall – Registration, Profile, Commerce & More plugin for WordPress is vulnerable to arbitrary shortcode execution due to a missing capability check on the 'rcl_preview_post' AJAX endpoint in all versions up to, and including, 16.26.10. This makes it possible for authenticated attackers, with Subscriber-level access and above, to execute arbitrary shortcodes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:plechevandrey:wp-recall:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "16.26.12",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-08T10:15Z",
    "lastModifiedDate" : "2025-03-24T18:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1326",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/homey-booking-wordpress-theme/23338013",
          "name" : "https://themeforest.net/item/homey-booking-wordpress-theme/23338013",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0ef3ae7-b3c0-4f54-a95d-9f8cf9497d8f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c0ef3ae7-b3c0-4f54-a95d-9f8cf9497d8f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Homey theme for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the homey_reservation_del() function in all versions up to, and including, 2.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary reservations and posts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:favethemes:homey:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-02T04:15Z",
    "lastModifiedDate" : "2025-05-06T15:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1327",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          }, {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/homey-booking-wordpress-theme/23338013",
          "name" : "https://themeforest.net/item/homey-booking-wordpress-theme/23338013",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/38aa649c-e9d3-458b-b567-e2e751aaca00?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/38aa649c-e9d3-458b-b567-e2e751aaca00?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Homey theme for WordPress is vulnerable to Insecure Direct Object Reference in all versions up to, and including, 2.4.4 via the 'homey_delete_user_account' action due to missing validation on a user controlled key. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete other user's accounts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:favethemes:homey:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-02T04:15Z",
    "lastModifiedDate" : "2025-05-06T15:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1328",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/mrlegend-typedjs/trunk/public/class-typed-js-public.php#L128",
          "name" : "https://plugins.trac.wordpress.org/browser/mrlegend-typedjs/trunk/public/class-typed-js-public.php#L128",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/mrlegend-typedjs/#developers",
          "name" : "https://wordpress.org/plugins/mrlegend-typedjs/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdb15198-68dc-4612-abcc-6b02843f1629?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fdb15198-68dc-4612-abcc-6b02843f1629?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Typed JS: A typewriter style animation plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘typespeed’ parameter in all versions up to, and including, 1.2.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mrlegend1235:typed_js:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-20T10:15Z",
    "lastModifiedDate" : "2025-02-25T18:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1329",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232923",
          "name" : "https://www.ibm.com/support/pages/node/7232923",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.ibm.com/support/pages/node/7232924",
          "name" : "https://www.ibm.com/support/pages/node/7232924",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the \n\ngethostbyaddr \n\n function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_1:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_2:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_3:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_4:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_10:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_11:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_12:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_13:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_14:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_15:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_16:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_17:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_18:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_19:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_20:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_21:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_22:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_23:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_24:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_5:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_6:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_7:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_8:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_9:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-08T22:15Z",
    "lastModifiedDate" : "2025-06-05T14:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1330",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232923",
          "name" : "https://www.ibm.com/support/pages/node/7232923",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.ibm.com/support/pages/node/7232924",
          "name" : "https://www.ibm.com/support/pages/node/7232924",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1  could allow a local user to execute arbitrary code on the system due to failure to handle DNS return requests by the gethostbyname  function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_1:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_2:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_3:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_4:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_10:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_11:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_12:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_13:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_14:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_15:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_16:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_17:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_18:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_19:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_20:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_21:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_22:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_23:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_24:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_5:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_6:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_7:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_8:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_9:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-08T22:15Z",
    "lastModifiedDate" : "2025-06-05T14:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1331",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-242"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232923",
          "name" : "https://www.ibm.com/support/pages/node/7232923",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.ibm.com/support/pages/node/7232924",
          "name" : "https://www.ibm.com/support/pages/node/7232924",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM CICS TX Standard 11.1 and IBM CICS TX Advanced 10.1 and 11.1 could allow a local user to execute arbitrary code on the system due to the use of unsafe use of the gets function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:-:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_1:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_2:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_3:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_4:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_10:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_11:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_12:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_13:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_14:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_15:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_16:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_17:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_18:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_19:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_20:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_21:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_22:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_23:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_24:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_5:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_6:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_7:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_8:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:cics_tx:11.1.0.0:interim_fix_9:*:*:standard:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-08T22:15Z",
    "lastModifiedDate" : "2025-06-05T14:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1332",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/xjd2020/fastcms/issues/IBKJ1W",
          "name" : "https://gitee.com/xjd2020/fastcms/issues/IBKJ1W",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295942",
          "name" : "VDB-295942 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295942",
          "name" : "VDB-295942 | FastCMS Template Menu menu cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in FastCMS up to 0.1.5 and classified as problematic. This vulnerability affects unknown code of the file /fastcms.html#/template/menu of the component Template Menu. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:xjd2020:fastcms:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "0.1.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-16T01:15Z",
    "lastModifiedDate" : "2025-02-16T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1333",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-214"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232272",
          "name" : "https://www.ibm.com/support/pages/node/7232272",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM MQ Container when used with the IBM MQ Operator LTS 2.0.0 through 2.0.29, MQ Operator CD 3.0.0, 3.0.1, 3.1.0 through 3.1.3, 3.3.0, 3.4.0, 3.4.1, 3.5.0, 3.5.1, and MQ Operator SC2 3.2.0 through 3.2.10  and configured with Cloud Pak for Integration Keycloak could disclose sensitive information to a privileged user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.5,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-05-01T22:15Z",
    "lastModifiedDate" : "2025-05-02T13:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1334",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-525"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7235432",
          "name" : "https://www.ibm.com/support/pages/node/7235432",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM QRadar Suite Software 1.10.12.0 through 1.11.2.0 and IBM Cloud Pak for Security 1.10.0.0 through 1.10.11.0 allows web pages to be stored locally which can be read by another user on the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_security:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.0.0",
          "versionEndIncluding" : "1.10.11.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qradar_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.10.12.0",
          "versionEndIncluding" : "1.11.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-03T16:15Z",
    "lastModifiedDate" : "2025-08-12T20:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1335",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-1.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295950",
          "name" : "VDB-295950 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295950",
          "name" : "VDB-295950 | CmsEasy file_admin.php deleteimg_action path traversal",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.493682",
          "name" : "Submit #493682 | ?????????????????? SiPing Shi JiuZhou Yitong KeJi YouXianGongSi CmsEasy V7.7.7.9 Path Traversal",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in CmsEasy 7.7.7.9. Affected is the function deleteimg_action in the library lib/admin/file_admin.php. The manipulation of the argument imgname leads to path traversal. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-16T04:15Z",
    "lastModifiedDate" : "2025-02-28T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1336",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-2.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/CmsEasy/CmsEasy-v7.7.7.9-PathTraversal-2-2-2.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295951",
          "name" : "VDB-295951 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295951",
          "name" : "VDB-295951 | CmsEasy image_admin.php deleteimg_action path traversal",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.493685",
          "name" : "Submit #493685 | ????????????? Siping Jiuzhou Yitong Technology Co., Ltd. CmsEasy V7.7.7.9 Path Traversal",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in CmsEasy 7.7.7.9 and classified as problematic. Affected by this vulnerability is the function deleteimg_action in the library lib/admin/image_admin.php. The manipulation of the argument imgname leads to path traversal. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cmseasy:cmseasy:7.7.7.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-16T09:15Z",
    "lastModifiedDate" : "2025-02-28T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1337",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1uTRLoCnOGcXtSpoZO8xyPakhIO4MbCMk/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1uTRLoCnOGcXtSpoZO8xyPakhIO4MbCMk/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295953",
          "name" : "VDB-295953 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295953",
          "name" : "VDB-295953 | Eastnets PaymentSafe BIC Search cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.493686",
          "name" : "Submit #493686 | Eastnets PaymentSafe 2.5.26.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Eastnets PaymentSafe 2.5.26.0. It has been classified as problematic. This affects an unknown part of the component BIC Search. The manipulation leads to cross site scripting. It is possible to initiate the attack remotely. Upgrading to version 2.5.27.0 is able to address this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-16T11:15Z",
    "lastModifiedDate" : "2025-04-09T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1338",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://pan.baidu.com/s/1YW52iM0ehUfFKa_CiTHBjQ?from=init&pwd=kqec",
          "name" : "https://pan.baidu.com/s/1YW52iM0ehUfFKa_CiTHBjQ?from=init&pwd=kqec",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295954",
          "name" : "VDB-295954 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295954",
          "name" : "VDB-295954 | NUUO Camera handle_config.php print_file command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.493912",
          "name" : "Submit #493912 | NUUO NUUO Came handle_config.php Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in NUUO Camera up to 20250203. It has been declared as critical. This vulnerability affects the function print_file of the file /handle_config.php. The manipulation of the argument log leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-16T11:15Z",
    "lastModifiedDate" : "2025-02-16T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1339",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/stevenchen0x01/CVE2/blob/main/cve1.md",
          "name" : "https://github.com/stevenchen0x01/CVE2/blob/main/cve1.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295955",
          "name" : "VDB-295955 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295955",
          "name" : "VDB-295955 | TOTOLINK X18 cstecgi.cgi setL2tpdConfig os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495367",
          "name" : "Submit #495367 | TOTOlink  X18 V9.1.0cu.2024_B20220329 Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been rated as critical. This issue affects the function setL2tpdConfig of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument enable leads to os command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:x18_firmware:9.1.0cu.2024_b20220329:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:x18:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-16T12:15Z",
    "lastModifiedDate" : "2025-02-16T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1340",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/stevenchen0x01/CVE2/blob/main/stack_overflow.md",
          "name" : "https://github.com/stevenchen0x01/CVE2/blob/main/stack_overflow.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295956",
          "name" : "VDB-295956 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295956",
          "name" : "VDB-295956 | TOTOLINK X18 cstecgi.cgi setPasswordCfg stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.495368",
          "name" : "Submit #495368 | totolink x18 V9.1.0cu.2024_B20220329 stack overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in TOTOLINK X18 9.1.0cu.2024_B20220329. Affected is the function setPasswordCfg of the file /cgi-bin/cstecgi.cgi. The manipulation as part of String leads to stack-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:x18_firmware:9.1.0cu.2024_b20220329:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:x18:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-16T14:15Z",
    "lastModifiedDate" : "2025-02-16T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1341",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-521"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mega.nz/file/yY0BnAgK#08RcRH8c8D4zMhKLEqQwMenHV65lnHsOSuV4eQkdcxY",
          "name" : "https://mega.nz/file/yY0BnAgK#08RcRH8c8D4zMhKLEqQwMenHV65lnHsOSuV4eQkdcxY",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295959",
          "name" : "VDB-295959 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295959",
          "name" : "VDB-295959 | PMWeb Setting weak password",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.495635",
          "name" : "Submit #495635 | PMWEB PMWeb 7.2.0 Weak Password Policy PMWeb allowing Account Takeover of any user",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in PMWeb 7.2.0. This affects an unknown part of the component Setting Handler. The manipulation leads to weak password requirements. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. It is recommended to change the configuration settings. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.7,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-16T14:15Z",
    "lastModifiedDate" : "2025-02-16T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1348",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-525"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237068",
          "name" : "https://www.ibm.com/support/pages/node/7237068",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 could allow a local user to obtain sensitive information from a user’s web browser cache due to not using a suitable caching policy."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
            "versionStartIncluding" : "6.0.0.0",
            "versionEndExcluding" : "6.1.2.7",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
            "versionStartIncluding" : "6.2",
            "versionEndExcluding" : "6.2.0.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "6.0.0.0",
            "versionEndExcluding" : "6.1.2.7",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "6.2.0.0",
            "versionEndExcluding" : "6.2.0.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.5,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-18T17:15Z",
    "lastModifiedDate" : "2025-07-25T17:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1349",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237109",
          "name" : "https://www.ibm.com/support/pages/node/7237109",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Sterling B2B Integrator and IBM Sterling File Gateway 6.0.0.0 through 6.1.2.6 and 6.2.0.0 through 6.2.0.4 \n\nis vulnerable to stored cross-site scripting. This vulnerability allows a privileged user to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
            "versionStartIncluding" : "6.0.0.0",
            "versionEndExcluding" : "6.1.2.7",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_b2b_integrator:*:*:*:*:standard:*:*:*",
            "versionStartIncluding" : "6.2",
            "versionEndExcluding" : "6.2.0.5",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "6.0.0.0",
            "versionEndExcluding" : "6.1.2.7",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:sterling_file_gateway:*:*:*:*:*:*:*:*",
            "versionStartIncluding" : "6.2.0.0",
            "versionEndExcluding" : "6.2.0.5",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:ibm:aix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-18T17:15Z",
    "lastModifiedDate" : "2025-07-25T17:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1351",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7237157",
          "name" : "https://www.ibm.com/support/pages/node/7237157",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Storage Virtualize 8.5, 8.6, and 8.7 products could allow a user to escalate their privileges to that of another user logging in at the same time due to a race condition in the login function."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:storage_virtualize:8.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-07T17:15Z",
    "lastModifiedDate" : "2025-08-14T00:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1352",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15923",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15923",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32650",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32650",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32650#c2",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32650#c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295960",
          "name" : "VDB-295960 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295960",
          "name" : "VDB-295960 | GNU elfutils eu-readelf libdw_alloc.c __libdw_thread_tail memory corruption",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.495965",
          "name" : "Submit #495965 | GNU elfutils/eu-readelf 0.192 illegal read access",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in GNU elfutils 0.192 and classified as critical. This vulnerability affects the function __libdw_thread_tail in the library libdw_alloc.c of the component eu-readelf. The manipulation of the argument w leads to memory corruption. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is 2636426a091bd6c6f7f02e49ab20d4cdc6bfc753. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-16T15:15Z",
    "lastModifiedDate" : "2025-02-16T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1353",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295961",
          "name" : "VDB-295961 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295961",
          "name" : "VDB-295961 | Kong Insomnia profapi.dll untrusted search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496010",
          "name" : "Submit #496010 | Kong Insomnia 10.3.0 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Kong Insomnia up to 10.3.0 and classified as critical. This issue affects some unknown processing in the library profapi.dll. The manipulation leads to untrusted search path. An attack has to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The real existence of this vulnerability is still doubted at the moment. The vendor is not able to reproduce the issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-16T15:15Z",
    "lastModifiedDate" : "2025-02-26T08:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1354",
        "ASSIGNER" : "security@asus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295962",
          "name" : "VDB-295962 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295962",
          "name" : "VDB-295962 | Asus RT-N12E sysinfo.asp cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496013",
          "name" : "Submit #496013 | ASUS RT-N12E 2.0.0.19 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.asus.com/",
          "name" : "https://www.asus.com/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295962",
          "name" : "VDB-295962 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295962",
          "name" : "VDB-295962 | Asus RT-N12E sysinfo.asp cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496013",
          "name" : "Submit #496013 | ASUS RT-N12E 2.0.0.19 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.asus.com/supportonly/rt-n10e/helpdesk_bios/",
          "name" : "https://www.asus.com/supportonly/rt-n10e/helpdesk_bios/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.asus.com/supportonly/rt-n12e/helpdesk_bios/",
          "name" : "https://www.asus.com/supportonly/rt-n12e/helpdesk_bios/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS)  vulnerability in the RT-N10E/ RT-N12E 2.0.0.x firmware . This vulnerability caused by improper input validation and can be triggered via the manipulation of the SSID argument in the sysinfo.asp file, leading to disclosure of sensitive information. Note: All versions of RT-N10E and RT-N12E are unsupported (End-of-Life, EOL). Consumers can mitigate this vulnerability by disabling the remote access features from WAN"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-16T16:15Z",
    "lastModifiedDate" : "2025-03-13T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1355",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295963",
          "name" : "VDB-295963 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295963",
          "name" : "VDB-295963 | needyamin Library Card System Add Picture signup.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496075",
          "name" : "Submit #496075 | Needyamin Library-Card-System 1.0 Unrestricted File Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/02/library-card-system-shell-by-maloyroyorko.html",
          "name" : "https://www.websecurityinsights.my.id/2025/02/library-card-system-shell-by-maloyroyorko.html",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in needyamin Library Card System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /signup.php of the component Add Picture. The manipulation leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:library_card_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-16T17:15Z",
    "lastModifiedDate" : "2025-02-25T03:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1356",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295964",
          "name" : "VDB-295964 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295964",
          "name" : "VDB-295964 | needyamin Library Card System card.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496087",
          "name" : "Submit #496087 | Needyamin Library-Card-System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.websecurityinsights.my.id/2025/02/needyamin-library-card-system-10.html",
          "name" : "https://www.websecurityinsights.my.id/2025/02/needyamin-library-card-system-10.html",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in needyamin Library Card System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file card.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:needyamin:library_card_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-16T18:15Z",
    "lastModifiedDate" : "2025-02-25T03:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1357",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295965",
          "name" : "VDB-295965 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295965",
          "name" : "VDB-295965 | Seventh D-Guard HTTP GET Request path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496137",
          "name" : "Submit #496137 | Seventh D-Guard NA Path Traversal",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Seventh D-Guard up to 20250206. This affects an unknown part of the component HTTP GET Request Handler. The manipulation leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-16T19:15Z",
    "lastModifiedDate" : "2025-02-16T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1358",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295966",
          "name" : "VDB-295966 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295966",
          "name" : "VDB-295966 | Pix Software Vivaz cross-site request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496141",
          "name" : "Submit #496141 | Pix Software Vivaz  6.0.10 Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Pix Software Vivaz 6.0.10. This vulnerability affects unknown code. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-16T20:15Z",
    "lastModifiedDate" : "2025-02-18T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1359",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295967",
          "name" : "VDB-295967 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295967",
          "name" : "VDB-295967 | SIAM Industria de Automação e Monitoramento qrcode.jsp cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496171",
          "name" : "Submit #496171 | SIAM Industria de Automação e Monitoramento Ltda. SIAM 2.0 Reflected Cross-Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in SIAM Industria de Automação e Monitoramento SIAM 2.0. This issue affects some unknown processing of the file /qrcode.jsp. The manipulation of the argument url leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-16T20:15Z",
    "lastModifiedDate" : "2025-02-16T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1360",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295968",
          "name" : "VDB-295968 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295968",
          "name" : "VDB-295968 | Internet Web Solutions Sublime CRM HTTP POST Request inicio.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496469",
          "name" : "Submit #496469 | Internet Web Solutions Sublime CRM N/A Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Internet Web Solutions Sublime CRM up to 20250207. Affected is an unknown function of the file /crm/inicio.php of the component HTTP POST Request Handler. The manipulation of the argument msg_to leads to cross site scripting. It is possible to launch the attack remotely. Other parameters might be affected as well. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-16T21:15Z",
    "lastModifiedDate" : "2025-02-16T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1361",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-285"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ip2location-country-blocker/trunk/ip2location-country-blocker.php#L114",
          "name" : "https://plugins.trac.wordpress.org/browser/ip2location-country-blocker/trunk/ip2location-country-blocker.php#L114",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3244193/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3244193/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/ip2location-country-blocker/#developers",
          "name" : "https://wordpress.org/plugins/ip2location-country-blocker/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b63bc2b6-1abc-4cfa-a7e5-3995640f66a7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b63bc2b6-1abc-4cfa-a7e5-3995640f66a7?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The IP2Location Country Blocker plugin for WordPress is vulnerable to Regular Information Exposure in all versions up to, and including, 2.38.8 due to missing capability checks on the admin_init() function. This makes it possible for unauthenticated attackers to view the plugin's settings."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ip2location:country_blocker:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.38.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-22T09:15Z",
    "lastModifiedDate" : "2025-03-06T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1362",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/035cc502-a514-440f-8808-5655c8c915e2/",
          "name" : "https://wpscan.com/vulnerability/035cc502-a514-440f-8808-5655c8c915e2/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The URL Shortener | Conversion Tracking  | AB Testing  | WooCommerce WordPress plugin through 9.0.2 does not have CSRF checks in some bulk actions, which could allow attackers to make logged in admins perform unwanted actions, such as deleting customers via CSRF attacks"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tahminajannat:url_shortener_\\|_conversion_tracking_\\|_ab_testing_\\|_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "9.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-09T06:15Z",
    "lastModifiedDate" : "2025-05-21T16:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1363",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/16b08e77-3562-4506-9b28-abd1b1128b0a/",
          "name" : "https://wpscan.com/vulnerability/16b08e77-3562-4506-9b28-abd1b1128b0a/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The URL Shortener | Conversion Tracking  | AB Testing  | WooCommerce WordPress plugin through 9.0.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tahminajannat:url_shortener_\\|_conversion_tracking_\\|_ab_testing_\\|_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "9.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-09T06:15Z",
    "lastModifiedDate" : "2025-05-21T17:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1364",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295969",
          "name" : "VDB-295969 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295969",
          "name" : "VDB-295969 | MicroWord eScan Antivirus USB Protection Service passPrompt stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496481",
          "name" : "Submit #496481 | MicroWord Escan Antivirus For Linux 7.0.32 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this vulnerability is the function passPrompt of the component USB Protection Service. The manipulation leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-16T23:15Z",
    "lastModifiedDate" : "2025-02-16T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1365",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15925",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15925",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32654",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32654",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32654#c2",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32654#c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295977",
          "name" : "VDB-295977 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295977",
          "name" : "VDB-295977 | GNU elfutils eu-readelf readelf.c process_symtab buffer overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496483",
          "name" : "Submit #496483 | GNU elfutils/eu-readelf 0.192 Buffer Over-read",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in GNU elfutils 0.192. This affects the function process_symtab of the file readelf.c of the component eu-readelf. The manipulation of the argument D/a leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The identifier of the patch is 5e5c0394d82c53e97750fe7b18023e6f84157b81. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-17T00:15Z",
    "lastModifiedDate" : "2025-02-17T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1366",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295970",
          "name" : "VDB-295970 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295970",
          "name" : "VDB-295970 | MicroWord eScan Antivirus VirusPopUp strcpy stack-based overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux and classified as critical. Affected by this issue is the function strcpy of the component VirusPopUp. The manipulation leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-17T01:15Z",
    "lastModifiedDate" : "2025-02-17T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1367",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295971",
          "name" : "VDB-295971 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295971",
          "name" : "VDB-295971 | MicroWord eScan Antivirus USB Password sprintf buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been classified as critical. This affects the function sprintf of the component USB Password Handler. The manipulation leads to buffer overflow. An attack has to be approached locally. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T01:15Z",
    "lastModifiedDate" : "2025-06-27T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1368",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295972",
          "name" : "VDB-295972 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295972",
          "name" : "VDB-295972 | MicroWord eScan Antivirus mwav.conf ReadConfiguration buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in MicroWord eScan Antivirus 7.0.32 on Linux. It has been declared as problematic. This vulnerability affects the function ReadConfiguration of the file /opt/MicroWorld/etc/mwav.conf. The manipulation of the argument BasePath leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T02:15Z",
    "lastModifiedDate" : "2025-06-27T17:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1369",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295975",
          "name" : "VDB-295975 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295975",
          "name" : "VDB-295975 | MicroWord eScan Antivirus USB Password os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496482",
          "name" : "Submit #496482 | MicroWord Escan Antivirus For Linux 7.0.32 OS Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in MicroWord eScan Antivirus 7.0.32 on Linux. Affected by this vulnerability is an unknown functionality of the component USB Password Handler. The manipulation leads to os command injection. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T02:15Z",
    "lastModifiedDate" : "2025-06-27T17:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1370",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "name" : "https://github.com/dmknght/FIS_RnD/blob/main/escan_av_usb_protection_multiple_vulns.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295976",
          "name" : "VDB-295976 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295976",
          "name" : "VDB-295976 | MicroWorld eScan Antivirus Autoscan USB epsdaemon sprintf os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in MicroWorld eScan Antivirus 7.0.32 on Linux. Affected by this issue is the function sprintf of the file epsdaemon of the component Autoscan USB. The manipulation leads to os command injection. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:escanav:escan_anti-virus:7.0.32:*:*:*:*:linux:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T03:15Z",
    "lastModifiedDate" : "2025-06-27T17:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1371",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15926",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15926",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32655",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32655",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32655",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32655",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32655#c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295978",
          "name" : "VDB-295978 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295978",
          "name" : "VDB-295978 | GNU elfutils eu-read readelf.c handle_dynamic_symtab null pointer dereference",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496484",
          "name" : "Submit #496484 | GNU elfutils/eu-readelf 0.192 Buffer Over-read",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in GNU elfutils 0.192 and classified as problematic. This vulnerability affects the function handle_dynamic_symtab of the file readelf.c of the component eu-read. The manipulation leads to null pointer dereference. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The patch is identified as b38e562a4c907e08171c76b8b2def8464d5a104a. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T03:15Z",
    "lastModifiedDate" : "2025-02-18T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1372",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15927",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15927",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32656",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32656",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32656#c3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32657",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32657",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295981",
          "name" : "VDB-295981 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295981",
          "name" : "VDB-295981 | GNU elfutils eu-readelf readelf.c print_string_section buffer overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496485",
          "name" : "Submit #496485 | GNU elfutils/eu-readelf 0.192 buffer over read",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in GNU elfutils 0.192. It has been declared as critical. Affected by this vulnerability is the function dump_data_section/print_string_section of the file readelf.c of the component eu-readelf. The manipulation of the argument z/x leads to buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is 73db9d2021cab9e23fd734b0a76a612d52a6f1db. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-17T03:15Z",
    "lastModifiedDate" : "2025-02-17T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1373",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          }, {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://ffmpeg.org/",
          "name" : "https://ffmpeg.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/43be8d07281caca2e88bfd8ee2333633e1fb1a13",
          "name" : "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/43be8d07281caca2e88bfd8ee2333633e1fb1a13",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://trac.ffmpeg.org/attachment/ticket/11460/poc",
          "name" : "https://trac.ffmpeg.org/attachment/ticket/11460/poc",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://trac.ffmpeg.org/ticket/11460",
          "name" : "https://trac.ffmpeg.org/ticket/11460",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295982",
          "name" : "VDB-295982 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295982",
          "name" : "VDB-295982 | FFmpeg MOV Parser mov.c mov_read_trak null pointer dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496930",
          "name" : "Submit #496930 | FFmpeg git master NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in FFmpeg up to 7.1. It has been rated as problematic. Affected by this issue is the function mov_read_trak of the file libavformat/mov.c of the component MOV Parser. The manipulation leads to null pointer dereference. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The patch is identified as 43be8d07281caca2e88bfd8ee2333633e1fb1a13. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "7.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-17T04:15Z",
    "lastModifiedDate" : "2025-06-03T17:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1374",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/sql-gu2.pdf",
          "name" : "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/sql-gu2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295983",
          "name" : "VDB-295983 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295983",
          "name" : "VDB-295983 | code-projects Real Estate Property Management System search.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.499767",
          "name" : "Submit #499767 | code-projects Real Estate Property ManagementSystem v1.0 php SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Real Estate Property Management System 1.0. This affects an unknown part of the file /search.php. The manipulation of the argument StateName/CityName/AreaName/CatId leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-17T04:15Z",
    "lastModifiedDate" : "2025-02-24T12:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1376",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15940",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15940",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32672",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32672",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32672#c3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295984",
          "name" : "VDB-295984 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295984",
          "name" : "VDB-295984 | GNU elfutils eu-strip elf_strptr.c elf_strptr denial of service",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497538",
          "name" : "Submit #497538 | GNU elfutils/eu-strip 0.192 illegal read access",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in GNU elfutils 0.192. This vulnerability affects the function elf_strptr in the library /libelf/elf_strptr.c of the component eu-strip. The manipulation leads to denial of service. It is possible to launch the attack on the local host. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used. The name of the patch is b16f441cca0a4841050e3215a9f120a6d8aea918. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 2.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-17T05:15Z",
    "lastModifiedDate" : "2025-02-17T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1377",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sourceware.org/bugzilla/attachment.cgi?id=15941",
          "name" : "https://sourceware.org/bugzilla/attachment.cgi?id=15941",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32673",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32673",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32673#c2",
          "name" : "https://sourceware.org/bugzilla/show_bug.cgi?id=32673#c2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295985",
          "name" : "VDB-295985 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.295985",
          "name" : "VDB-295985 | GNU elfutils eu-strip strip.c gelf_getsymshndx denial of service",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497539",
          "name" : "Submit #497539 | GNU elfutils/eu-strip 0.192 illegal read access",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gnu.org/",
          "name" : "https://www.gnu.org/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in GNU elfutils 0.192. This issue affects the function gelf_getsymshndx of the file strip.c of the component eu-strip. The manipulation leads to denial of service. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The identifier of the patch is fbf1df9ca286de3323ae541973b08449f8d03aba. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-17T05:15Z",
    "lastModifiedDate" : "2025-02-17T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1378",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/radareorg/radare2/commit/c6c772d2eab692ce7ada5a4227afd50c355ad545",
          "name" : "https://github.com/radareorg/radare2/commit/c6c772d2eab692ce7ada5a4227afd50c355ad545",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/radareorg/radare2/issues/23953",
          "name" : "https://github.com/radareorg/radare2/issues/23953",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/radareorg/radare2/issues/23953#issue-2844325926",
          "name" : "https://github.com/radareorg/radare2/issues/23953#issue-2844325926",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://github.com/radareorg/radare2/milestone/86",
          "name" : "https://github.com/radareorg/radare2/milestone/86",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295986",
          "name" : "VDB-295986 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295986",
          "name" : "VDB-295986 | radare2 rasm2 rasm2.c memory corruption",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.498499",
          "name" : "Submit #498499 | www.radare.org/ radare2/rasm2 473664b1e7fa76bcb72a1cb4f1c01e1e820b7c81 negative size param",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in radare2 5.9.9 33286. Affected is an unknown function in the library /libr/main/rasm2.c of the component rasm2. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0.0 is able to address this issue. The patch is identified as c6c772d2eab692ce7ada5a4227afd50c355ad545. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:radare:radare2:5.9.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 3.3,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-17T06:15Z",
    "lastModifiedDate" : "2025-06-23T14:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1379",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/gu3.pdf",
          "name" : "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/gu3.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/gu3.pdf",
          "name" : "https://github.com/1337g/realestatepropertymanagement_poc/blob/main/gu3.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295987",
          "name" : "VDB-295987 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295987",
          "name" : "VDB-295987 | code-projects Real Estate Property Management System CustomerReport.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.501070",
          "name" : "Submit #501070 | code-projects Real Estate Property Management System in php  0/1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in code-projects Real Estate Property Management System 1.0 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /Admin/CustomerReport.php. The manipulation of the argument city leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-17T07:15Z",
    "lastModifiedDate" : "2025-04-02T18:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1380",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.295988",
          "name" : "VDB-295988 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295988",
          "name" : "VDB-295988 | Codezips Gym Management System del_plan.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.501980",
          "name" : "Submit #501980 | Codezips Gym Management System in PHP with Source Code   V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/polaris-pisym/aevk1q/fdkeqw2a2ug9zohn",
          "name" : "https://www.yuque.com/polaris-pisym/aevk1q/fdkeqw2a2ug9zohn",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/polaris-pisym/aevk1q/fdkeqw2a2ug9zohn",
          "name" : "https://www.yuque.com/polaris-pisym/aevk1q/fdkeqw2a2ug9zohn",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /dashboard/admin/del_plan.php. The manipulation of the argument name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-17T07:15Z",
    "lastModifiedDate" : "2025-04-02T19:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1381",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Lonpeak/cve/blob/main/upload-1.md",
          "name" : "https://github.com/Lonpeak/cve/blob/main/upload-1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Lonpeak/cve/blob/main/upload-1.md",
          "name" : "https://github.com/Lonpeak/cve/blob/main/upload-1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.295989",
          "name" : "VDB-295989 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.295989",
          "name" : "VDB-295989 | code-projects Real Estate Property Management System ajax_city.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502070",
          "name" : "Submit #502070 | code-projects Real Estate Property Management System V1.0 PHP SQL INJECTION AND Unrestricted Upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Real Estate Property Management System 1.0. It has been classified as critical. This affects an unknown part of the file /ajax_city.php. The manipulation of the argument CityName leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-17T08:15Z",
    "lastModifiedDate" : "2025-04-11T18:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1382",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/a3002265-ac83-4c00-8afb-cbfbb4afc1e9/",
          "name" : "https://wpscan.com/vulnerability/a3002265-ac83-4c00-8afb-cbfbb4afc1e9/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Contact Us By Lord Linus WordPress plugin through 2.6 does not have CSRF check in some places, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lordlinus:contact_us:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-09T06:15Z",
    "lastModifiedDate" : "2025-05-21T16:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1383",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/podlove-podcasting-plugin-for-wordpress/tags/4.2.0/lib/modules/transcripts/transcripts.php#L223",
          "name" : "https://plugins.trac.wordpress.org/browser/podlove-podcasting-plugin-for-wordpress/tags/4.2.0/lib/modules/transcripts/transcripts.php#L223",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246867/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246867/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/#developers",
          "name" : "https://wordpress.org/plugins/podlove-podcasting-plugin-for-wordpress/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/00a95ae7-3c58-4e5e-aaef-c04d1dacf27f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/00a95ae7-3c58-4e5e-aaef-c04d1dacf27f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Podlove Podcast Publisher plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 4.2.2. This is due to missing or incorrect nonce validation on the ajax_transcript_delete() function. This makes it possible for unauthenticated attackers to delete arbitrary episode transcripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:podlove:podlove_podcast_publisher:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.2.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-06T12:15Z",
    "lastModifiedDate" : "2025-03-19T20:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1384",
        "ASSIGNER" : "omron@example.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2025-004_en.pdf",
          "name" : "https://www.fa.omron.co.jp/product/security/assets/pdf/en/OMSR-2025-004_en.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.fa.omron.co.jp/product/security/assets/pdf/ja/OMSR-2025-004_ja.pdf",
          "name" : "https://www.fa.omron.co.jp/product/security/assets/pdf/ja/OMSR-2025-004_ja.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Least Privilege Violation (CWE-272) Vulnerability exists in the communication function between the NJ/NX-series Machine Automation Controllers and the Sysmac Studio Software. An attacker may use this vulnerability to perform unauthorized access and to execute unauthorized code remotely to the controller products."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-14T00:15Z",
    "lastModifiedDate" : "2025-07-14T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1385",
        "ASSIGNER" : "security@clickhouse.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5phv-x8x4-83x5",
          "name" : "https://github.com/ClickHouse/ClickHouse/security/advisories/GHSA-5phv-x8x4-83x5",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When the library bridge feature is enabled, the clickhouse-library-bridge exposes an HTTP API on localhost. This allows clickhouse-server to dynamically load a library from a specified path and execute it in an isolated process. Combined with the ClickHouse table engine functionality that permits file uploads to specific directories, a misconfigured server can be exploited by an attacker with privilege to access to both table engines to execute arbitrary code on the ClickHouse server.\n\nYou can check if your ClickHouse server is vulnerable to this vulnerability by inspecting the configuration file and confirming if the following setting is enabled:\n\n<library_bridge>\n   <port>9019</port>\n</library_bridge>"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-20T08:15Z",
    "lastModifiedDate" : "2025-03-20T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1386",
        "ASSIGNER" : "security@clickhouse.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ClickHouse/ch-go/security/advisories/GHSA-m454-3xv7-qj85",
          "name" : "https://github.com/ClickHouse/ch-go/security/advisories/GHSA-m454-3xv7-qj85",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When using the ch-go library, under a specific condition when the query includes a large, uncompressed malicious external data, it is possible for an attacker in control of such data to smuggle another query packet into the connection stream."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-11T05:15Z",
    "lastModifiedDate" : "2025-04-11T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1387",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1390"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8428-59a9a-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8428-59a9a-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8427-daea8-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8427-daea8-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Orca HCM from LEARNING DIGITAL has an Improper Authentication vulnerability, allowing unauthenticated remote attackers to log in to the system as any user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-17T04:15Z",
    "lastModifiedDate" : "2025-02-17T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1388",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8430-32513-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8430-32513-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8429-07d7e-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8429-07d7e-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Orca HCM from LEARNING DIGITAL has an Arbitrary File Upload vulnerability, allowing remote attackers with regular privileges to upload and run web shells"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-17T04:15Z",
    "lastModifiedDate" : "2025-02-17T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1389",
        "ASSIGNER" : "cve@cert.org.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.twcert.org.tw/en/cp-139-8432-4b516-2.html",
          "name" : "https://www.twcert.org.tw/en/cp-139-8432-4b516-2.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.twcert.org.tw/tw/cp-132-8431-61e42-1.html",
          "name" : "https://www.twcert.org.tw/tw/cp-132-8431-61e42-1.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Orca HCM from Learning Digital has a SQL Injection vulnerability, allowing attackers with regular privileges to inject arbitrary SQL commands to read, modify, and delete database contents."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-17T05:15Z",
    "lastModifiedDate" : "2025-02-17T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1390",
        "ASSIGNER" : "security@openanolis.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.openanolis.cn/show_bug.cgi?id=18804",
          "name" : "https://bugzilla.openanolis.cn/show_bug.cgi?id=18804",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The PAM module pam_cap.so of libcap configuration supports group names starting with “@”, during actual parsing, configurations not starting with “@” are incorrectly recognized as group names. This may result in nonintended users being granted an inherited capability set, potentially leading to security risks. Attackers can exploit this vulnerability to achieve local privilege escalation on systems where /etc/security/capability.conf is used to configure user inherited privileges by constructing specific usernames."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T03:15Z",
    "lastModifiedDate" : "2025-02-18T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1391",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2544",
          "name" : "RHSA-2025:2544",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2545",
          "name" : "RHSA-2025:2545",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1391",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1391",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2346082",
          "name" : "RHBZ#2346082",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the Keycloak organization feature, which allows the incorrect assignment of an organization to a user if their username or email matches the organization’s domain pattern. This issue occurs at the mapper level, leading to misrepresentation in tokens. If an application relies on these claims for authorization, it may incorrectly assume a user belongs to an organization they are not a member of, potentially granting unauthorized access or privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-17T14:15Z",
    "lastModifiedDate" : "2025-03-10T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1392",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296023",
          "name" : "VDB-296023 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296023",
          "name" : "VDB-296023 | D-Link DIR-816 index.html cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.501351",
          "name" : "Submit #501351 | D-Link DIR-816 1.01TO Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in D-Link DIR-816 1.01TO and classified as problematic. Affected by this vulnerability is an unknown functionality of the file /cgi-bin/webproc?getpage=html/index.html&var:menu=24gwlan&var:page=24G_basic. The manipulation of the argument SSID leads to cross site scripting. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dir-816_firmware:1.01to:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dir-816:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-17T16:15Z",
    "lastModifiedDate" : "2025-07-16T14:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1393",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://certvde.com/en/advisories/VDE-2025-021",
          "name" : "https://certvde.com/en/advisories/VDE-2025-021",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unauthenticated remote attacker can use hard-coded credentials to gain full administration privileges on the affected product."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T08:15Z",
    "lastModifiedDate" : "2025-03-05T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1394",
        "ASSIGNER" : "product-security@silabs.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://community.silabs.com/068Vm00000SkHNX",
          "name" : "https://community.silabs.com/068Vm00000SkHNX",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-7.5.0.0.pdf",
          "name" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-7.5.0.0.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.0.3.0.pdf",
          "name" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.0.3.0.pdf",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.1.0.0.pdf",
          "name" : "https://www.silabs.com/documents/public/release-notes/emberznet-release-notes-8.1.0.0.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Failure to handle the error status returned by the buffer management APIs in SiLabs EmberZNet Zigbee stack may result in data leaks or potential Denial of Service (DoS)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-30T08:15Z",
    "lastModifiedDate" : "2025-07-31T18:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1398",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Desktop App versions <=5.10.0 explicitly declared unnecessary macOS entitlements which allows an attacker with remote access to bypass Transparency, Consent, and Control (TCC) via code injection."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T15:15Z",
    "lastModifiedDate" : "2025-03-31T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1399",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1399",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1399",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds Read vulnerability in unpack_response (session.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-07T07:15Z",
    "lastModifiedDate" : "2025-05-07T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1400",
        "ASSIGNER" : "prodsec@nozominetworks.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1400",
          "name" : "https://www.nozominetworks.com/labs/vulnerability-advisories-cve-2025-1400",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds Read vulnerability in unpack_response (conn.c) in libplctag from 2.0 through 2.6.3 allows Overread Buffers via network."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-07T07:15Z",
    "lastModifiedDate" : "2025-05-07T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1401",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/072620a2-76db-49d2-aae5-1170c409f7e7/",
          "name" : "https://wpscan.com/vulnerability/072620a2-76db-49d2-aae5-1170c409f7e7/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Click Info WordPress plugin through 2.7.4 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:s-a:wp_click_info:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.7.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T06:15Z",
    "lastModifiedDate" : "2025-04-29T14:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1402",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/event-tickets/tags/5.18.1/src/Tribe/Assets.php#L202",
          "name" : "https://plugins.trac.wordpress.org/browser/event-tickets/tags/5.18.1/src/Tribe/Assets.php#L202",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/event-tickets/tags/5.18.1/src/Tribe/Metabox.php#L30",
          "name" : "https://plugins.trac.wordpress.org/browser/event-tickets/tags/5.18.1/src/Tribe/Metabox.php#L30",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/event-tickets/tags/5.18.1/src/Tribe/Metabox.php#L490",
          "name" : "https://plugins.trac.wordpress.org/browser/event-tickets/tags/5.18.1/src/Tribe/Metabox.php#L490",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordfence.freshdesk.com/a/tickets/375051",
          "name" : "https://wordfence.freshdesk.com/a/tickets/375051",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbd838b6-7792-4378-8969-a70c6e16ff6a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbd838b6-7792-4378-8969-a70c6e16ff6a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Event Tickets and Registration plugin for WordPress is vulnerable to unauthorized loss of data due to a missing capability check on the 'ajax_ticket_delete' function in all versions up to, and including, 5.19.1.1. This makes it possible for authenticated attackers, with Contributor-level access and above, to delete arbitrary Attendee tickets."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:theeventscalendar:event_tickets:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.19.1.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-21T12:15Z",
    "lastModifiedDate" : "2025-02-25T04:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1403",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7183868",
          "name" : "https://www.ibm.com/support/pages/node/7183868",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Qiskit SDK 0.45.0 through 1.2.4 could allow a remote attacker to cause a denial of service using a maliciously crafted QPY file containing a malformed symengine serialization stream which can cause a segfault within the symengine library."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qiskit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.45.0",
          "versionEndIncluding" : "1.2.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-21T17:15Z",
    "lastModifiedDate" : "2025-06-18T23:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1404",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/secure-copy-content-protection/tags/4.4.6/admin/class-secure-copy-content-protection-admin.php#L943",
          "name" : "https://plugins.trac.wordpress.org/browser/secure-copy-content-protection/tags/4.4.6/admin/class-secure-copy-content-protection-admin.php#L943",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/secure-copy-content-protection/tags/4.4.6/admin/js/secure-copy-content-protection-admin.js",
          "name" : "https://plugins.trac.wordpress.org/browser/secure-copy-content-protection/tags/4.4.6/admin/js/secure-copy-content-protection-admin.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246301",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246301",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/secure-copy-content-protection/#developers",
          "name" : "https://wordpress.org/plugins/secure-copy-content-protection/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7363b5de-db30-4b35-b701-5c8f2835ec6c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7363b5de-db30-4b35-b701-5c8f2835ec6c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Secure Copy Content Protection and Content Locking plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the ays_sccp_reports_user_search() function in all versions up to, and including, 4.4.7. This makes it possible for unauthenticated attackers to retrieve a list of registered user emails."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-01T12:15Z",
    "lastModifiedDate" : "2025-03-01T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1405",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246414/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246414/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/post-type-x/#developers",
          "name" : "https://wordpress.org/plugins/post-type-x/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2ddd9a2-79d7-4f9c-9832-25c3363d3ce9?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2ddd9a2-79d7-4f9c-9832-25c3363d3ce9?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Product Catalog Simple plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's show_products shortcode in all versions up to, and including, 1.7.11 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:implecode:product_catalog_simple:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T07:15Z",
    "lastModifiedDate" : "2025-03-06T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1406",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/newpost-catch/#developers",
          "name" : "https://wordpress.org/plugins/newpost-catch/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbbea6bf-b795-4837-9dc9-7cb8769ab89f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dbbea6bf-b795-4837-9dc9-7cb8769ab89f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Newpost Catch plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's npc shortcode in all versions up to, and including, 1.3.19 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:imamura:newpost_catch:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.3.19",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-21T04:15Z",
    "lastModifiedDate" : "2025-02-25T03:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1407",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/amo-team-showcase/#developers",
          "name" : "https://wordpress.org/plugins/amo-team-showcase/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0950d3-4d7b-457a-8e67-df310d2712d4?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/cf0950d3-4d7b-457a-8e67-df310d2712d4?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AMO Team Showcase plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's amoteam_skills shortcode in all versions up to, and including, 1.1.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:amothemo:amo_team_showcase:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-21T04:15Z",
    "lastModifiedDate" : "2025-02-25T03:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1408",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.3/public/class-profile-magic-public.php#L3262",
          "name" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.3/public/class-profile-magic-public.php#L3262",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.3/public/class-profile-magic-public.php#L3306",
          "name" : "https://plugins.trac.wordpress.org/browser/profilegrid-user-profiles-groups-and-communities/tags/5.9.4.3/public/class-profile-magic-public.php#L3306",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/641f7727-83ba-45c2-b3e1-1ce19f86eac7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/641f7727-83ba-45c2-b3e1-1ce19f86eac7?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ProfileGrid – User Profiles, Groups and Communities plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the pm_decline_join_group_request and pm_approve_join_group_request functions in all versions up to, and including, 5.9.4.4. This makes it possible for authenticated attackers, with Subscriber-level access and above, to approve or decline join group requests which is normally should be available to administrators only."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:metagauss:profilegrid:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.9.4.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-22T05:15Z",
    "lastModifiedDate" : "2025-03-27T00:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1410",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3243992/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3243992/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/pie-calendar/#developers",
          "name" : "https://wordpress.org/plugins/pie-calendar/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fcaea2fb-ebf8-49b4-8cd5-0d9208252a90?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fcaea2fb-ebf8-49b4-8cd5-0d9208252a90?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Events Calendar Made Simple – Pie Calendar plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's piecal shortcode in all versions up to, and including, 1.2.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:jonathanjernigan:pie_calendar:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.2.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-21T09:15Z",
    "lastModifiedDate" : "2025-02-25T03:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1411",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7236658",
          "name" : "https://www.ibm.com/support/pages/node/7236658",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Security Verify Directory Container 10.0.0.0 through 10.0.3.1 could allow a local user to execute commands as root due to execution with unnecessary privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:security_verify_directory:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.0.0",
          "versionEndIncluding" : "10.0.3.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-15T13:15Z",
    "lastModifiedDate" : "2025-08-11T18:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1412",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 9.11.x <= 9.11.6, 10.4.x <= 10.4.1 fail to invalidate all active sessions when converting a user to a bot, with allows the converted user to escalate their privileges depending on the permissions granted to the bot."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-24T08:15Z",
    "lastModifiedDate" : "2025-02-24T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1413",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://apps.apple.com/pl/app/davinci-resolve/id571213070?mt=12",
          "name" : "https://apps.apple.com/pl/app/davinci-resolve/id571213070?mt=12",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/en/posts/2025/02/CVE-2025-1413/",
          "name" : "https://cert.pl/en/posts/2025/02/CVE-2025-1413/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/02/CVE-2025-1413/",
          "name" : "https://cert.pl/posts/2025/02/CVE-2025-1413/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DaVinci Resolve on MacOS was found to be installed with incorrect file permissions (rwxrwxrwx). This is inconsistent with standard macOS security practices, where applications should have drwxr-xr-x permissions. Incorrect permissions allow for Dylib Hijacking. Guest account, other users and applications can exploit this vulnerability for privilege escalation. This issue affects DaVinci Resolve on MacOS in versions before 19.1.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T09:15Z",
    "lastModifiedDate" : "2025-03-26T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1414",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1943179",
          "name" : "Memory safety bugs fixed in Firefox 135.0.1",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-12/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-12/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 135.0.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "135.0.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T14:15Z",
    "lastModifiedDate" : "2025-03-28T19:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1415",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A low-privileged user is able to obtain information about tasks executed on devices controlled by Proget MDM (Mobile Device Management), as well as details of the devices like their UUIDs needed for exploitation of CVE-2025-1416.\n\nIn order to perform the attack, one has to know a task_id, but since it's a low integer and there is no limit of requests an attacker can perform to a vulnerable endpoint, the task_id might be simply brute forced.\n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T12:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1416",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Proget MDM, a low-privileged user can retrieve passwords for managed devices and subsequently use functionalities restricted by the MDM (Mobile Device Management). For it to happen, they must know the UUIDs of targetted devices, which might be obtained by exploiting CVE-2025-1415 or CVE-2025-1417.\n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T13:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1417",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Proget MDM, a low-privileged user can access information about changes contained in backups of all devices managed by the MDM (Mobile Device Management). This information include user ids, email addresses, first names, last names and device UUIDs. The last one can be used for exploitation of CVE-2025-1416.\n\nSuccessful exploitation requires UUID of a targeted backup, which cannot be brute forced. \n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T13:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1418",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A low-privileged user can access information about profiles created in Proget MDM (Mobile Device Management), which contain details about allowed/prohibited functions. The profiles do not reveal any sensitive information (including their usage in connected devices).   \n\n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T13:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1419",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Input provided in comment section of Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack.\n\n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T13:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1420",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Input provided in a field containing \"activationMessage\" in Konsola Proget is not sanitized correctly, allowing a high-privileged user to perform a Stored Cross-Site Scripting attack.\n\n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T13:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1421",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "name" : "https://cert.pl/en/posts/2025/05/CVE-2025-1415",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://proget.pl/en/mobile-device-management/",
          "name" : "https://proget.pl/en/mobile-device-management/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Data provided in a request performed to the server while activating a new device are put in a database. Other high privileged users might download this data as a CSV file and corrupt their PC by opening it in a tool such as Microsoft Excel. The attacker could gain remote access to the user's PC.\n\n\nThis issue has been fixed in 2.17.5 version of Konsola Proget (server part of the MDM suite)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T13:16Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1424",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
          "name" : "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A privilege escalation vulnerability in PocketBook InkPad Color 3 allows attackers to escalate to root privileges if they gain physical access to the device.\nThis issue affects InkPad Color 3 in version U743k3.6.8.3671."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T16:15Z",
    "lastModifiedDate" : "2025-03-04T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1425",
        "ASSIGNER" : "vulnerability@ncsc.ch"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
          "name" : "https://www.redguard.ch/blog/2025/03/04/security-advisory-pocketbook-inkpad-color-3/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Sudo privilege misconfiguration vulnerability in PocketBook InkPad Color 3 on Linux, ARM allows attackers to read file contents on the device.This issue affects InkPad Color 3: U743k3.6.8.3671."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T16:15Z",
    "lastModifiedDate" : "2025-03-04T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1426",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html",
          "name" : "https://chromereleases.googleblog.com/2025/02/stable-channel-update-for-desktop_18.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/383465163",
          "name" : "https://issues.chromium.org/issues/383465163",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Heap buffer overflow in GPU in Google Chrome on Android prior to 133.0.6943.126 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "133.0.6943.126",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-19T17:15Z",
    "lastModifiedDate" : "2025-04-07T19:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1427",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1428",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted CATPART file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1429",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1430",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1431",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted SLDPRT file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1432",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted 3DM file, when parsed through Autodesk AutoCAD, can force a Use-After-Free vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1433",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1434",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.areal-topkapi.com/en/topkapi/security-bulletins",
          "name" : "https://www.areal-topkapi.com/en/topkapi/security-bulletins",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.areal-topkapi.com/topkapi/bulletins-de-securite",
          "name" : "https://www.areal-topkapi.com/topkapi/bulletins-de-securite",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Spreadsheet view is vulnerable to a XSS attack, where a remote unauthorised attacker can read a limited amount of values or DoS the affected spreadsheet. Disclosure of secrets or other system settings is not affected as well as other spreadsheets still work as expected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-11T08:15Z",
    "lastModifiedDate" : "2025-03-11T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1435",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/bbpress/trunk/includes/users/signups.php#L151",
          "name" : "https://plugins.trac.wordpress.org/browser/bbpress/trunk/includes/users/signups.php#L151",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3247345/bbpress/branches/2.6/includes/users/capabilities.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3247345/bbpress/branches/2.6/includes/users/capabilities.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3247345%40bbpress&new=3247345%40bbpress&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3247345%40bbpress&new=3247345%40bbpress&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d776d94-8c81-4e88-bae3-946824a75c09?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d776d94-8c81-4e88-bae3-946824a75c09?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The bbPress plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 2.6.11. This is due to missing or incorrect nonce validation on the bbp_user_add_role_on_register() function. This makes it possible for unauthenticated attackers to elevate their privileges to that of a bbPress Keymaster via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. Rather than implementing a nonce check to provide protection against this vulnerability, which would break functionality, the plugin no longer makes it possible to select a role during registration."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-05T09:15Z",
    "lastModifiedDate" : "2025-03-05T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1436",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/",
          "name" : "https://wpscan.com/vulnerability/849ed0a0-be17-43cf-a3a1-ad54dfb33d57/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Limit Bio WordPress plugin through 1.0 does not have CSRF check when updating its settings, and is missing sanitisation as well as escaping, which could allow attackers to make logged in admin add Stored XSS payloads via a CSRF attack."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:rivercitygraphix:limit_bio:1.0:*:*:*:*:wordpress*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T06:15Z",
    "lastModifiedDate" : "2025-04-29T14:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1437",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/676b4768-98ea-4e55-87de-ef7ae1d7a113?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/676b4768-98ea-4e55-87de-ef7ae1d7a113?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'advanced_iframe' shortcode in all versions up to, and including, 2024.5 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2025.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T10:15Z",
    "lastModifiedDate" : "2025-07-14T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1439",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ac1145b-5ab1-47a9-9117-4870c52a70fc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5ac1145b-5ab1-47a9-9117-4870c52a70fc?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Advanced iFrame plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'advanced_iframe' shortcode in all versions up to, and including, 2024.5 due to insufficient input sanitization and output escaping on user supplied attributes through the 'src' attribute when the src supplied returns a header with an injected value . This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2025.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T10:15Z",
    "lastModifiedDate" : "2025-07-14T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1440",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=#file1",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255604%40advanced-iframe&new=3255604%40advanced-iframe&sfp_email=&sfph_mail=#file1",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b92913fa-aa1e-40a0-9a48-d730b2102217?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b92913fa-aa1e-40a0-9a48-d730b2102217?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Advanced iFrame plugin for WordPress is vulnerable to unauthorized excessive creation of options on the aip_map_url_callback() function in all versions up to, and including, 2024.5 due to insufficient restrictions. This makes it possible for unauthenticated attackers to update the advancediFrameParameterData option with an excessive amount of unvalidated data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tinywebgallery:advanced_iframe:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2025.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-26T10:15Z",
    "lastModifiedDate" : "2025-07-14T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1441",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1007/classes/modules/wpr-filter-woo-products.php#L1895",
          "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1007/classes/modules/wpr-filter-woo-products.php#L1895",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1008/classes/modules/wpr-filter-woo-products.php#L1904",
          "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/tags/1.7.1008/classes/modules/wpr-filter-woo-products.php#L1904",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6bc6a436-6df3-4eaf-a16b-d8b3c3ca7d87?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6bc6a436-6df3-4eaf-a16b-d8b3c3ca7d87?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.7.1007. This is due to missing or incorrect nonce validation on the 'wpr_filter_woo_products' function. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.7.1007",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-19T05:15Z",
    "lastModifiedDate" : "2025-02-28T19:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1445",
        "ASSIGNER" : "cybersecurity@hitachienergy.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-820"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000207&languageCode=en&Preview=true",
          "name" : "https://publisher.hitachienergy.com/preview?DocumentId=8DBD000207&languageCode=en&Preview=true",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in RTU IEC 61850 client and server functionality that could impact the availability if renegotiation of an open IEC61850 TLS connection takes place in specific timing situations, when IEC61850 communication is active.\n\nPrecondition is that IEC61850 as client or server are configured using TLS on RTU500 device. It affects the CMU the IEC61850 stack is configured on."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T13:15Z",
    "lastModifiedDate" : "2025-03-25T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1446",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/c170fb45-7ed5-40ef-99f6-8da035a23d89/",
          "name" : "https://wpscan.com/vulnerability/c170fb45-7ed5-40ef-99f6-8da035a23d89/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/c170fb45-7ed5-40ef-99f6-8da035a23d89/",
          "name" : "https://wpscan.com/vulnerability/c170fb45-7ed5-40ef-99f6-8da035a23d89/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Pods  WordPress plugin before 3.2.8.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:podsfoundation:pods:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.2.8.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-23T06:15Z",
    "lastModifiedDate" : "2025-04-02T14:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1447",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/kasuganosoras/Pigeon/commit/84cea5fe73141689da2e7ec8676d47435bd6423e",
          "name" : "https://github.com/kasuganosoras/Pigeon/commit/84cea5fe73141689da2e7ec8676d47435bd6423e",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kasuganosoras/Pigeon/releases/tag/1.0.181",
          "name" : "https://github.com/kasuganosoras/Pigeon/releases/tag/1.0.181",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/sheratan4/cve/issues/2",
          "name" : "https://github.com/sheratan4/cve/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296134",
          "name" : "VDB-296134 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296134",
          "name" : "VDB-296134 | kasuganosoras Pigeon index.php server-side request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501978",
          "name" : "Submit #501978 | https://github.com/kasuganosoras/Pigeon Pigeon v1.0.177 SSRF",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in kasuganosoras Pigeon 1.0.177. It has been declared as critical. This vulnerability affects unknown code of the file /pigeon/imgproxy/index.php. The manipulation of the argument url leads to server-side request forgery. The attack can be initiated remotely. Upgrading to version 1.0.181 is able to address this issue. The patch is identified as 84cea5fe73141689da2e7ec8676d47435bd6423e. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-19T01:15Z",
    "lastModifiedDate" : "2025-02-19T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1448",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/stevenchen0x01/CVE/issues/1",
          "name" : "https://github.com/stevenchen0x01/CVE/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296135",
          "name" : "VDB-296135 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296135",
          "name" : "VDB-296135 | Synway SMG Gateway Management Software 9-12ping.php command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.494788",
          "name" : "Submit #494788 | Hangzhou Synway Digital Information Technology Co.,Ltd. SMG Gateway Management Software 9-12ping.php Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Synway SMG Gateway Management Software up to 20250204. It has been rated as critical. This issue affects some unknown processing of the file 9-12ping.php. The manipulation of the argument retry leads to command injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-19T02:15Z",
    "lastModifiedDate" : "2025-02-19T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1449",
        "ASSIGNER" : "PSIRT@rockwellautomation.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1723.html",
          "name" : "https://www.rockwellautomation.com/en-us/trust-center/security-advisories/advisory.SD1723.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in the Rockwell Automation Verve Asset Manager due to insufficient variable sanitizing. A portion of the administrative web interface for Verve's Legacy Agentless Device Inventory (ADI) capability (deprecated since the 1.36 release) allows users to change a variable with inadequate sanitizing. If exploited, it could allow a threat actor with administrative access to run arbitrary commands in the context of the container running the service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-31T16:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1450",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.4/js/cht-front-script.js#L389",
          "name" : "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.4/js/cht-front-script.js#L389",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.5/js/cht-front-script.min.js",
          "name" : "https://plugins.trac.wordpress.org/browser/chaty/tags/3.3.5/js/cht-front-script.min.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246336/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246336/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a87d0966-3fd4-46f8-acd5-1cf0cb18af42?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a87d0966-3fd4-46f8-acd5-1cf0cb18af42?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Floating Chat Widget: Contact Chat Icons, Telegram Chat, Line Messenger, WeChat, Email, SMS, Call Button, WhatsApp – Chaty plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘data-hover’ parameter in all versions up to, and including, 3.3.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:premio:floating_chat_widget:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.3.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-27T10:15Z",
    "lastModifiedDate" : "2025-03-11T15:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1451",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/63f5aea4-953b-4b38-9f10-3afe425be1d4",
          "name" : "https://huntr.com/bounties/63f5aea4-953b-4b38-9f10-3afe425be1d4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in parisneo/lollms-webui v13 arises from the server's handling of multipart boundaries in file uploads. The server does not limit or validate the length of the boundary or the characters appended to it, allowing an attacker to craft requests with excessively long boundaries, leading to resource exhaustion and eventual denial of service (DoS). Despite an attempted patch in commit 483431bb, which blocked hyphen characters from being appended to the multipart boundary, the fix is insufficient. The server remains vulnerable if other characters (e.g., '4', 'a') are used instead of hyphens. This allows attackers to exploit the vulnerability using different characters, causing resource exhaustion and service unavailability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lollms:lollms_web_ui:13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-27T15:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1452",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/47365daf-7ef5-471a-ab0e-f6d1b40ca56c/",
          "name" : "https://wpscan.com/vulnerability/47365daf-7ef5-471a-ab0e-f6d1b40ca56c/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Favorites WordPress plugin before 2.3.5 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:favoriteposts:favorites:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.3.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T06:15Z",
    "lastModifiedDate" : "2025-05-06T19:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1453",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/6bf93a34-a19f-4266-a95d-033551db43e6/",
          "name" : "https://wpscan.com/vulnerability/6bf93a34-a19f-4266-a95d-033551db43e6/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/6bf93a34-a19f-4266-a95d-033551db43e6/",
          "name" : "https://wpscan.com/vulnerability/6bf93a34-a19f-4266-a95d-033551db43e6/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Category Posts Widget WordPress plugin before 4.9.20 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zephyrwest:category_posts_widget:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.9.20",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-24T06:15Z",
    "lastModifiedDate" : "2025-05-07T19:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1454",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/0089f813-82fa-4ffc-acd6-a70e67edc8ea/",
          "name" : "https://wpscan.com/vulnerability/0089f813-82fa-4ffc-acd6-a70e67edc8ea/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ninja Pages WordPress plugin through 1.4.2 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ninja_pages_project:ninja_pages:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T20:16Z",
    "lastModifiedDate" : "2025-06-12T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1455",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/woo-grid/widgets/wpr-woo-grid.php#L9280",
          "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/modules/woo-grid/widgets/wpr-woo-grid.php#L9280",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3262790/royal-elementor-addons/tags/1.7.1013/modules/woo-grid/widgets/wpr-woo-grid.php?old=3255849&old_path=royal-elementor-addons%2Ftags%2F1.7.1012%2Fmodules%2Fwoo-grid%2Fwidgets%2Fwpr-woo-grid.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3262790/royal-elementor-addons/tags/1.7.1013/modules/woo-grid/widgets/wpr-woo-grid.php?old=3255849&old_path=royal-elementor-addons%2Ftags%2F1.7.1012%2Fmodules%2Fwoo-grid%2Fwidgets%2Fwpr-woo-grid.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5666e2b7-acb3-4abb-ac2a-1575206435cf?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5666e2b7-acb3-4abb-ac2a-1575206435cf?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Woo Grid widget in all versions up to, and including, 1.7.1012 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.7.1013",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-12T09:15Z",
    "lastModifiedDate" : "2025-07-08T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1456",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/assets/js/frontend.min.js",
          "name" : "https://plugins.trac.wordpress.org/browser/royal-elementor-addons/trunk/assets/js/frontend.min.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3262790/royal-elementor-addons/tags/1.7.1013/assets/js/frontend.js?old=3255849&old_path=royal-elementor-addons%2Ftags%2F1.7.1012%2Fassets%2Fjs%2Ffrontend.js",
          "name" : "https://plugins.trac.wordpress.org/changeset/3262790/royal-elementor-addons/tags/1.7.1013/assets/js/frontend.js?old=3255849&old_path=royal-elementor-addons%2Ftags%2F1.7.1012%2Fassets%2Fjs%2Ffrontend.js",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/68c6e428-b9cf-442f-a896-a8ceb4b9be0e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/68c6e428-b9cf-442f-a896-a8ceb4b9be0e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Royal Elementor Addons and Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the `widgetGrid`, `widgetCountDown`, and `widgetInstagramFeed` methods in all versions up to, and including, 1.7.1012 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:royal-elementor-addons:royal_elementor_addons:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.7.1013",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-12T09:15Z",
    "lastModifiedDate" : "2025-07-08T18:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1457",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-countdown.min.js",
          "name" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-countdown.min.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-wrapper-link.min.js",
          "name" : "https://plugins.trac.wordpress.org/browser/bdthemes-element-pack-lite/trunk/assets/js/modules/ep-wrapper-link.min.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3272946%40bdthemes-element-pack-lite&new=3272946%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=#file1095",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3272946%40bdthemes-element-pack-lite&new=3272946%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=#file1095",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3272946%40bdthemes-element-pack-lite&new=3272946%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=#file1097",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3272946%40bdthemes-element-pack-lite&new=3272946%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=#file1097",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ac5484-3caa-4821-990b-cd49c2c4873d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c6ac5484-3caa-4821-990b-cd49c2c4873d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Wrapper Link, Countdown and Gallery widgets in all versions up to, and including, 5.10.28 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-19T04:15Z",
    "lastModifiedDate" : "2025-04-21T14:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1458",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3277466%40bdthemes-element-pack-lite&new=3277466%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3277466%40bdthemes-element-pack-lite&new=3277466%40bdthemes-element-pack-lite&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fbd3170-a45b-4ae6-bc59-4cfb92f6c2a6?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7fbd3170-a45b-4ae6-bc59-4cfb92f6c2a6?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Element Pack Addons for Elementor – Free Templates and Widgets for Your WordPress Websites plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets like Dual Button, Creative Button, Image Stack and more in all versions up to, and including, 5.10.29 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bdthemes:element_pack:*:*:*:*:lite:wordpress:*:*",
          "versionEndExcluding" : "5.10.30",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-26T06:15Z",
    "lastModifiedDate" : "2025-05-06T14:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1459",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3247428%40siteorigin-panels&new=3247428%40siteorigin-panels&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3247428%40siteorigin-panels&new=3247428%40siteorigin-panels&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e14c12ef-0774-4459-9a2c-9a4b633a0efe?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e14c12ef-0774-4459-9a2c-9a4b633a0efe?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Page Builder by SiteOrigin plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Embedded Video(PB) widget in all versions up to, and including, 2.31.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:siteorigin:page_builder:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.31.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-01T07:15Z",
    "lastModifiedDate" : "2025-08-12T17:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1460",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T23:15Z",
    "lastModifiedDate" : "2025-02-26T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1461",
        "ASSIGNER" : "disclosures@herodevs.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461",
          "name" : "https://github.com/neverendingsupport/nes-vuetify-cve-2025-1461",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-1461",
          "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-1461",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of the value of the 'eventMoreText' property of the 'VCalendar' component in Vuetify allows unsanitized HTML to be inserted into the page. This can lead to a  Cross-Site Scripting (XSS) https://owasp.org/www-community/attacks/xss  attack. The vulnerability occurs because the default Vuetify translator will return the translation key as the translation, if it can't find an actual translation.\n\nThis issue affects Vuetify versions greater than or equal to 2.0.0 and less than 3.0.0.\n\nNote:\nVersion 2.x of Vuetify is End-of-Life and will not receive any updates to address this issue. For more information see  here https://v2.vuetifyjs.com/en/about/eol/ ."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-28T18:15Z",
    "lastModifiedDate" : "2025-05-29T14:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1463",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpgsi/trunk/admin/class-wpgsi-show.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wpgsi/trunk/admin/class-wpgsi-show.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250077/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250077/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250077/#file352",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250077/#file352",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wpgsi/#developers",
          "name" : "https://wordpress.org/plugins/wpgsi/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/034ba83f-4ee3-40f1-a41a-8b3d0055a1ba?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/034ba83f-4ee3-40f1-a41a-8b3d0055a1ba?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Spreadsheet Integration plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.8.2. This is due to improper nonce validation within the class-wpgsi-show.php script. This makes it possible for unauthenticated attackers to publish arbitrary posts, including private, granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-05T12:15Z",
    "lastModifiedDate" : "2025-03-05T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1464",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/stevenchen0x01/CVE/issues/2",
          "name" : "https://github.com/stevenchen0x01/CVE/issues/2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296237",
          "name" : "VDB-296237 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296237",
          "name" : "VDB-296237 | Baiyi Cloud Asset Management System admin.house.collect.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.494807",
          "name" : "Submit #494807 | Hunan Zhonghe Baiyi Information Technology Co., Ltd. Baiyi Cloud Asset Management System /wuser/admin.house.collect.php SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Baiyi Cloud Asset Management System up to 20250204. This issue affects some unknown processing of the file /wuser/admin.house.collect.php. The manipulation of the argument project_id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-19T14:15Z",
    "lastModifiedDate" : "2025-02-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1465",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/NeoVuln/CVE/issues/6",
          "name" : "https://github.com/NeoVuln/CVE/issues/6",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296238",
          "name" : "VDB-296238 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.296238",
          "name" : "VDB-296238 | lmxcms Maintenance db.inc.php code injection",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.496877",
          "name" : "Submit #496877 | LMXCMS lmxcms 1.41 Code Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in lmxcms 1.41. Affected is an unknown function of the file db.inc.php of the component Maintenance. The manipulation leads to code injection. It is possible to launch the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lmxcms:lmxcms:1.41:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.7,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-19T16:15Z",
    "lastModifiedDate" : "2025-02-25T21:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1467",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/Rudloff/d48f525215bd5426cbb076116c4422dd",
          "name" : "https://gist.github.com/Rudloff/d48f525215bd5426cbb076116c4422dd",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/AmauriC/tarteaucitron.js/commit/12490579001d5caa187adcaecb01da570a12076b",
          "name" : "https://github.com/AmauriC/tarteaucitron.js/commit/12490579001d5caa187adcaecb01da570a12076b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/AmauriC/tarteaucitron.js/issues/1184",
          "name" : "https://github.com/AmauriC/tarteaucitron.js/issues/1184",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-JS-TARTEAUCITRONJS-8731160",
          "name" : "https://security.snyk.io/vuln/SNYK-JS-TARTEAUCITRONJS-8731160",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package tarteaucitronjs before 1.17.0 are vulnerable to Cross-site Scripting (XSS) via the getElemWidth() and getElemHeight(). This is related to [SNYK-JS-TARTEAUCITRONJS-8366541](https://security.snyk.io/vuln/SNYK-JS-TARTEAUCITRONJS-8366541)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-23T16:15Z",
    "lastModifiedDate" : "2025-02-23T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1468",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-203"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.vde.com/en/advisories/VDE-2025-022",
          "name" : "https://cert.vde.com/en/advisories/VDE-2025-022",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An unauthenticated remote attacker can gain access to sensitive information including authentication information when using CODESYS OPC UA Server with the non-default Basic128Rsa15 security policy."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-18T11:15Z",
    "lastModifiedDate" : "2025-03-18T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1469",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0163",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0163",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authorization Bypass Through User-Controlled Key vulnerability in Turtek Software Eyotek allows Exploitation of Trusted Identifiers.This issue affects Eyotek: before 11.03.2025."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-21T09:15Z",
    "lastModifiedDate" : "2025-07-22T13:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1470",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/eclipse-omr/omr/pull/7655",
          "name" : "https://github.com/eclipse-omr/omr/pull/7655",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/eclipse-omr/omr/pull/7663",
          "name" : "https://github.com/eclipse-omr/omr/pull/7663",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://gitlab.eclipse.org/security/cve-assignement/-/issues/54",
          "name" : "https://gitlab.eclipse.org/security/cve-assignement/-/issues/54",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Eclipse OMR, from the initial contribution to version 0.4.0, some OMR internal port library and utilities consumers of z/OS atoe functions do not check their return values for NULL memory pointers or for memory allocation failures.  This can lead to NULL pointer dereference crashes.  Beginning in version 0.5.0, internal OMR consumers of atoe functions handle NULL return values and memory allocation failures correctly."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:omr:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "0.4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-21T10:15Z",
    "lastModifiedDate" : "2025-03-05T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1471",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/eclipse-omr/omr/pull/7658",
          "name" : "https://github.com/eclipse-omr/omr/pull/7658",
          "refsource" : "",
          "tags" : [ "Patch", "Vendor Advisory" ]
        }, {
          "url" : "https://gitlab.eclipse.org/security/cve-assignement/-/issues/55",
          "name" : "https://gitlab.eclipse.org/security/cve-assignement/-/issues/55",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Eclipse OMR versions 0.2.0 to 0.4.0, some of the z/OS atoe print functions use a constant length buffer for string conversion. If the input format string and arguments are larger than the buffer size then buffer overflow occurs.  Beginning in version 0.5.0, the conversion buffers are sized correctly and checked appropriately to prevent buffer overflows."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:omr:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.2.0",
          "versionEndIncluding" : "0.4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-21T10:15Z",
    "lastModifiedDate" : "2025-03-05T19:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1472",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 9.11.x <= 9.11.8 fail to properly perform authorization of the Viewer role which allows an attacker with the Viewer role configured with No Access to Reporting to still view team and site statistics."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-19T15:15Z",
    "lastModifiedDate" : "2025-03-19T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1473",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mlflow/mlflow/commit/ecfa61cb43d3303589f3b5834fd95991c9706628",
          "name" : "https://github.com/mlflow/mlflow/commit/ecfa61cb43d3303589f3b5834fd95991c9706628",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/43dc50b6-7d1e-41b9-9f97-f28809df1d45",
          "name" : "https://huntr.com/bounties/43dc50b6-7d1e-41b9-9f97-f28809df1d45",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Cross-Site Request Forgery (CSRF) vulnerability exists in the Signup feature of mlflow/mlflow versions 2.17.0 to 2.20.1. This vulnerability allows an attacker to create a new account, which may be used to perform unauthorized actions on behalf of the malicious user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2.17.0",
          "versionEndExcluding" : "2.20.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-08-05T17:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1474",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-521"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mlflow/mlflow/commit/149c9e18aa219bc47e86b432e130e467a36f4a17",
          "name" : "https://github.com/mlflow/mlflow/commit/149c9e18aa219bc47e86b432e130e467a36f4a17",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/e79f7774-10fe-46b2-b522-e73b748e3b2d",
          "name" : "https://huntr.com/bounties/e79f7774-10fe-46b2-b522-e73b748e3b2d",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In mlflow/mlflow version 2.18, an admin is able to create a new user account without setting a password. This vulnerability could lead to security risks, as accounts without passwords may be susceptible to unauthorized access. Additionally, this issue violates best practices for secure user account management. The issue is fixed in version 2.19.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:lfprojects:mlflow:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.19.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-03-27T15:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1475",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.7.1/includes/form-validation.php#L110",
          "name" : "https://plugins.trac.wordpress.org/browser/wpcom-member/tags/1.7.1/includes/form-validation.php#L110",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3248208/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3248208/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/05178bf3-3040-41aa-ba43-779376d30298?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/05178bf3-3040-41aa-ba43-779376d30298?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPCOM Member plugin for WordPress is vulnerable to authentication bypass in all versions up to, and including, 1.7.5. This is due to insufficient verification on the 'user_phone' parameter when logging in. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if SMS login is enabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-07T07:15Z",
    "lastModifiedDate" : "2025-03-07T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1477",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/520353",
          "name" : "GitLab Issue #520353",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2987614",
          "name" : "HackerOne Bug Bounty Report #2987614",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 8.14 before 18.0.6, 18.1 before 18.1.4, and 18.2 before 18.2.2 that could have allowed an unauthenticated user to create a denial of service condition by sending specially crafted payloads to specific integration API endpoints."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.1.0",
          "versionEndExcluding" : "18.1.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.2.0",
          "versionEndExcluding" : "18.2.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "8.1.4",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "8.1.4",
          "versionEndExcluding" : "18.0.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-13T18:15Z",
    "lastModifiedDate" : "2025-08-15T16:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1478",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/520354",
          "name" : "GitLab Issue #520354",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2987444",
          "name" : "HackerOne Bug Bounty Report #2987444",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 8.13 before 17.10.7, 17.11 before 17.11.3, and 18.0 before 18.0.1. A lack of input validation in Board Names could be used to trigger a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.0.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "8.13.0",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "8.13.0",
          "versionEndExcluding" : "17.10.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-12T10:16Z",
    "lastModifiedDate" : "2025-08-08T18:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1479",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.lenovo.com/us/en/product_security/LEN-186929",
          "name" : "https://support.lenovo.com/us/en/product_security/LEN-186929",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An open debug interface was reported in the Legion Space software included on certain Legion devices that could allow a local attacker to execute arbitrary code."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-05-30T20:15Z",
    "lastModifiedDate" : "2025-06-02T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1481",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/shortcode-cleaner-lite/trunk/vendor/codestar/codestar/core/Module/Export.php#L53",
          "name" : "https://plugins.trac.wordpress.org/browser/shortcode-cleaner-lite/trunk/vendor/codestar/codestar/core/Module/Export.php#L53",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/shortcode-cleaner-lite/#developers",
          "name" : "https://wordpress.org/plugins/shortcode-cleaner-lite/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/15613da5-f900-4a33-8eec-6c9e52ed30fc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/15613da5-f900-4a33-8eec-6c9e52ed30fc?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Shortcode Cleaner Lite plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_backup() function in all versions up to, and including, 1.0.9. This makes it possible for authenticated attackers, with Subscriber-level access and above, to export arbitrary options."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:jozoor:shortcode_cleaner_lite:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.0.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-08T03:15Z",
    "lastModifiedDate" : "2025-03-12T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1483",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3243002/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3243002/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0906e9b0-5093-4ddd-8868-8fcaad8e3a5b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0906e9b0-5093-4ddd-8868-8fcaad8e3a5b?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The LTL Freight Quotes – GlobalTranz Edition plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the engtz_wd_save_dropship AJAX endpoint in all versions up to, and including, 2.3.12. This makes it possible for unauthenticated attackers to update the drop shipping settings."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wwexgroup:ltl_freight_quotes:*:*:*:*:globaltranz:wordpress:*:*",
          "versionEndExcluding" : "2.3.13",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-20T10:15Z",
    "lastModifiedDate" : "2025-02-25T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1484",
        "ASSIGNER" : "cybersecurity@hitachienergy.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-184"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch",
          "name" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000212&LanguageCode=en&DocumentPartId=&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in the media upload component of the Asset \nSuite versions listed below. If successfully exploited an attacker \ncould impact the confidentiality or integrity of the system. An attacker can use this vulnerability to construct a request that will \ncause JavaScript code supplied by the attacker to execute within \nthe user’s browser in the context of that user’s session with the \napplication."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-30T13:15Z",
    "lastModifiedDate" : "2025-05-30T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1485",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/0158eb67-cd36-4406-bf70-6f2be849ec52/",
          "name" : "https://wpscan.com/vulnerability/0158eb67-cd36-4406-bf70-6f2be849ec52/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Real Cookie Banner: GDPR & ePrivacy Cookie Consent WordPress plugin before 5.1.6, real-cookie-banner-pro WordPress plugin before 5.1.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devowl:wordpress_real_cookie_banner:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "5.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T06:15Z",
    "lastModifiedDate" : "2025-06-09T20:51Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1486",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/182ecda8-3385-4f9f-a917-efdeb237247c/",
          "name" : "https://wpscan.com/vulnerability/182ecda8-3385-4f9f-a917-efdeb237247c/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WoWPth WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:andreafarracani:wowpth:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T06:15Z",
    "lastModifiedDate" : "2025-04-09T13:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1487",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/9c683c2e-4f7f-4862-b844-6bdc3d1885dd/",
          "name" : "https://wpscan.com/vulnerability/9c683c2e-4f7f-4862-b844-6bdc3d1885dd/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WoWPth WordPress plugin through 2.0 does not sanitise and escape a parameter before outputting it back in the page, leading to a Reflected Cross-Site Scripting which could be used against high privilege users such as admin"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:andreafarracani:wowpth:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T06:15Z",
    "lastModifiedDate" : "2025-04-09T13:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1488",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-601"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3244747/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3244747/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/wpo365-msgraphmailer/#developers",
          "name" : "https://wordpress.org/plugins/wpo365-msgraphmailer/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3a1782c3-ae0b-42f1-aa5e-dabfa2a5bbcd?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3a1782c3-ae0b-42f1-aa5e-dabfa2a5bbcd?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.wpo365.com/change-log/",
          "name" : "https://www.wpo365.com/change-log/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WPO365 | MICROSOFT 365 GRAPH MAILER plugin for WordPress is vulnerable to Open Redirect in all versions up to, and including, 3.2. This is due to insufficient validation on the redirect url supplied via the 'redirect_to' parameter. This makes it possible for unauthenticated attackers to redirect users to potentially malicious sites if 1. they can successfully trick them into performing an action and 2. the plugin is activated but not configured."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpo365:microsoft_365_graph_mailer:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "3.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-24T11:15Z",
    "lastModifiedDate" : "2025-03-27T00:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1489",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3244084/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3244084/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-appbox/#developers",
          "name" : "https://wordpress.org/plugins/wp-appbox/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d58355d-2762-4ecc-aec2-52a1e3323017?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6d58355d-2762-4ecc-aec2-52a1e3323017?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP-Appbox plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's appbox shortcode in all versions up to, and including, 4.5.4 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tchgdns:wp-appbox:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.5.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-21T12:15Z",
    "lastModifiedDate" : "2025-02-24T19:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1490",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/smart-maintenance-mode/trunk/smart-maintenance-mode.php#L562",
          "name" : "https://plugins.trac.wordpress.org/browser/smart-maintenance-mode/trunk/smart-maintenance-mode.php#L562",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/smart-maintenance-mode/#developers",
          "name" : "https://wordpress.org/plugins/smart-maintenance-mode/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea9ca8ac-e735-4e84-af0f-45d22a8e2124?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ea9ca8ac-e735-4e84-af0f-45d22a8e2124?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Smart Maintenance Mode plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the ‘setstatus’ parameter in all versions up to, and including, 1.5.2 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T03:15Z",
    "lastModifiedDate" : "2025-03-26T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1491",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3248502/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3248502/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/wp-posts-carousel/#developers",
          "name" : "https://wordpress.org/plugins/wp-posts-carousel/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7f708c72-7ce2-4eb0-869b-cec4613f6f3f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7f708c72-7ce2-4eb0-869b-cec4613f6f3f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Posts Carousel plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘auto_play_timeout’ parameter in all versions up to, and including, 1.3.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-01T13:15Z",
    "lastModifiedDate" : "2025-03-01T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1492",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-674"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/wireshark/wireshark/-/issues/20373",
          "name" : "GitLab Issue #20373",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.wireshark.org/security/wnpa-sec-2025-01.html",
          "name" : "https://www.wireshark.org/security/wnpa-sec-2025-01.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Bundle Protocol and CBOR dissector crashes in Wireshark 4.4.0 to 4.4.3 and 4.2.0 to 4.2.10 allows denial of service via packet injection or crafted capture file"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.2.0",
          "versionEndIncluding" : "4.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wireshark:wireshark:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "4.4.0",
          "versionEndIncluding" : "4.4.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-20T02:15Z",
    "lastModifiedDate" : "2025-04-10T20:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1493",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://security.netapp.com/advisory/ntap-20250516-0001/",
          "name" : "https://security.netapp.com/advisory/ntap-20250516-0001/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.ibm.com/support/pages/node/7232518",
          "name" : "https://www.ibm.com/support/pages/node/7232518",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 12.1.0 through 12.1.1 \n\n\n\n\n\ncould allow an authenticated user to cause a denial of service due to concurrent execution of shared resources."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:linux:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:unix:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-05T21:15Z",
    "lastModifiedDate" : "2025-05-16T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1495",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232434",
          "name" : "https://www.ibm.com/support/pages/node/7232434",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Business Automation Workflow 24.0.0 and 24.0.1 through 24.0.1 IF001 Center may leak sensitive information due to missing authorization validation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:business_automation_workflow:24.0.1:*:*:*:traditional:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:business_automation_workflow:24.0.1:-:*:*:containers:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:business_automation_workflow:24.0.1:interim_fix_001:*:*:containers:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-03T17:15Z",
    "lastModifiedDate" : "2025-08-14T01:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1496",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-307"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.coslat.com/tr/blog/28-02-2025-guncelleme",
          "name" : "https://www.coslat.com/tr/blog/28-02-2025-guncelleme",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0075",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0075",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of Excessive Authentication Attempts vulnerability in BG-TEK Coslat Hotspot allows Password Brute Forcing, Authentication Abuse.This issue affects Coslat Hotspot: before 6.26.0.R.20250227."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-20T14:15Z",
    "lastModifiedDate" : "2025-03-20T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1497",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/03/CVE-2025-1497",
          "name" : "https://cert.pl/en/posts/2025/03/CVE-2025-1497",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://cert.pl/posts/2025/03/CVE-2025-1497",
          "name" : "https://cert.pl/posts/2025/03/CVE-2025-1497",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/mljar/plotai",
          "name" : "https://github.com/mljar/plotai",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/mljar/plotai/commit/bdcfb13484f0b85703a4c1ddfd71cb21840e7fde",
          "name" : "https://github.com/mljar/plotai/commit/bdcfb13484f0b85703a4c1ddfd71cb21840e7fde",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, that could result in Remote Code Execution (RCE), has been found in PlotAI. Lack of validation of LLM-generated output allows attacker to execute arbitrary Python code.\nVendor commented out vulnerable line, further usage of the software requires uncommenting it and thus accepting the risk. The vendor does not plan to release a patch to fix this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mljar:plotai:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.0.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-10T14:15Z",
    "lastModifiedDate" : "2025-03-24T18:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1499",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-312"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7233154",
          "name" : "https://www.ibm.com/support/pages/node/7233154",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM InfoSphere Information Server 11.7 stores credential information for database authentication in a cleartext parameter file that could be viewed by an authenticated user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server:11.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:infosphere_information_server_on_cloud:11.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-01T12:15Z",
    "lastModifiedDate" : "2025-06-09T18:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1500",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7230140",
          "name" : "https://www.ibm.com/support/pages/node/7230140",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Maximo Application Suite 9.0 could allow an authenticated user to upload a file with dangerous types that could be executed by another user if opened."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:maximo_application_suite:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.0",
          "versionEndExcluding" : "9.0.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-05T01:15Z",
    "lastModifiedDate" : "2025-07-08T20:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1502",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244195%40ip2location-redirection&new=3244195%40ip2location-redirection&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3244195%40ip2location-redirection&new=3244195%40ip2location-redirection&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bca41dd8-5bd3-4fee-9f3f-feb8f1a4c687?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bca41dd8-5bd3-4fee-9f3f-feb8f1a4c687?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The IP2Location Redirection plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'download_ip2location_redirection_backup' AJAX action in all versions up to, and including, 1.33.3. This makes it possible for unauthenticated attackers to download the plugin's settings."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-01T07:15Z",
    "lastModifiedDate" : "2025-03-01T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1503",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3254687/wp-recipe-maker/trunk/includes/public/class-wprm-list-saver.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3254687/wp-recipe-maker/trunk/includes/public/class-wprm-list-saver.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e23f63a0-3061-42e0-a6be-05fa20a174ea?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e23f63a0-3061-42e0-a6be-05fa20a174ea?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Recipe Maker plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Roundup Recipe Name field in all versions up to, and including, 9.8.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-13T05:15Z",
    "lastModifiedDate" : "2025-03-13T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1504",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/post-lockdown/",
          "name" : "https://wordpress.org/plugins/post-lockdown/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/447cef6f-fa2e-4087-946d-6e0214830ea9?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/447cef6f-fa2e-4087-946d-6e0214830ea9?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Post Lockdown plugin for WordPress is vulnerable to Information Exposure in all versions up to, and including, 4.0.2 via the 'pl_autocomplete' AJAX action due to insufficient restrictions on which posts can be included. This makes it possible for authenticated attackers, with Subscriber-level access and above, to extract data from password protected, private, or draft posts that they should not have access to."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:andypalmer:post_lockdown:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "4.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-08T03:15Z",
    "lastModifiedDate" : "2025-03-24T18:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1505",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3245830/woocommerce-ajax-filters/trunk/includes/wizard.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3245830/woocommerce-ajax-filters/trunk/includes/wizard.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/94b289bf-0ef1-47d1-98bd-8f7bb753c2bc?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/94b289bf-0ef1-47d1-98bd-8f7bb753c2bc?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Advanced AJAX Product Filters plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'nonce' parameter in all versions up to, and including, 1.6.8.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:berocket:advanced_ajax_product_filters:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.6.8.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T05:15Z",
    "lastModifiedDate" : "2025-03-06T20:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1506",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-social/tags/3.0.9/inc/counter.php#L189",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-social/tags/3.0.9/inc/counter.php#L189",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246155/wp-social/trunk/inc/counter.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246155/wp-social/trunk/inc/counter.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/669833b3-1689-4051-8990-c6eddae4858f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/669833b3-1689-4051-8990-c6eddae4858f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Wp Social Login and Register Social Counter plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.1.0. This is due to missing or incorrect nonce validation on the counter_access_key_setup() function. This makes it possible for unauthenticated attackers to update social login provider settings via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpmet:wp_social_login_and_register_social_counter:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-28T06:15Z",
    "lastModifiedDate" : "2025-08-01T02:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1507",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3255511/googleanalytics/trunk/class/core/class-ga-controller-core.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3255511/googleanalytics/trunk/class/core/class-ga-controller-core.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/314b8638-15e7-461d-a705-3858fe6813e7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/314b8638-15e7-461d-a705-3858fe6813e7?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ShareThis Dashboard for Google Analytics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the handle_actions() function in all versions up to, and including, 3.2.1. This makes it possible for unauthenticated attackers to disable all features."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sharethis:dashboard_for_google_analytics:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.2.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-14T09:15Z",
    "lastModifiedDate" : "2025-03-27T01:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1508",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/wp-crowdfunding/",
          "name" : "https://wordpress.org/plugins/wp-crowdfunding/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/70a93afa-9801-41d2-8923-ca4ae6ae974f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/70a93afa-9801-41d2-8923-ca4ae6ae974f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Crowdfunding plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the download_data action in all versions up to, and including, 2.1.13. This makes it possible for authenticated attackers, with subscriber-level access and above, to download all of a site's post content when WooCommerce is installed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themeum:wp_crowdfunding:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.1.13",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-12T04:15Z",
    "lastModifiedDate" : "2025-03-20T13:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1509",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/show-me-the-cookies/",
          "name" : "https://wordpress.org/plugins/show-me-the-cookies/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/65d15ceb-ab39-4088-a289-7244063aedf8?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/65d15ceb-ab39-4088-a289-7244063aedf8?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The The Show Me The Cookies plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 1.0. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpguru:show_me_the_cookies:1.0:*:*:*:*:wordpress:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-22T04:15Z",
    "lastModifiedDate" : "2025-03-06T12:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1510",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/custom-post-type-date-archives/",
          "name" : "https://wordpress.org/plugins/custom-post-type-date-archives/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/996ade9c-2531-4f43-87f6-eddb2ce98a12?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/996ade9c-2531-4f43-87f6-eddb2ce98a12?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The The Custom Post Type Date Archives plugin for WordPress is vulnerable to arbitrary shortcode execution in all versions up to, and including, 2.7.1. This is due to the software allowing users to execute an action that does not properly validate a value before running do_shortcode. This makes it possible for unauthenticated attackers to execute arbitrary shortcodes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:keesiemeijer:custom_post_type_date_archives:*:*:*:*:*:wordpresss:*:*",
          "versionEndIncluding" : "2.7.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-22T04:15Z",
    "lastModifiedDate" : "2025-03-06T12:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1511",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/user-registration/tags/4.0.2/modules/membership/includes/Admin/Membership/ListTable.php#L246",
          "name" : "https://plugins.trac.wordpress.org/browser/user-registration/tags/4.0.2/modules/membership/includes/Admin/Membership/ListTable.php#L246",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246826/user-registration/tags/4.1.0/modules/membership/includes/Admin/Membership/ListTable.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246826/user-registration/tags/4.1.0/modules/membership/includes/Admin/Membership/ListTable.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e0bee7c-8dce-421c-af16-7e5152797e6c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e0bee7c-8dce-421c-af16-7e5152797e6c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The User Registration & Membership – Custom Registration Form, Login Form, and User Profile plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 's' parameter in all versions up to, and including, 4.0.4 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpeverest:user_registration:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.1.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T06:15Z",
    "lastModifiedDate" : "2025-03-06T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1512",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3262339/powerpack-lite-for-elementor/trunk/assets/js/pp-custom-cursor.js",
          "name" : "https://plugins.trac.wordpress.org/changeset/3262339/powerpack-lite-for-elementor/trunk/assets/js/pp-custom-cursor.js",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/90579442-b05c-459e-93cb-f4883b6472ff?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/90579442-b05c-459e-93cb-f4883b6472ff?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The PowerPack Elementor Addons (Free Widgets, Extensions and Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Custom Cursor Extension in all versions up to, and including, 2.9.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-01T07:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1513",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245199%40contest-gallery&new=3245199%40contest-gallery&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3245199%40contest-gallery&new=3245199%40contest-gallery&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b5cf360-0163-4a7c-8979-ec89ec80ad62?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1b5cf360-0163-4a7c-8979-ec89ec80ad62?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Photos, Files, YouTube, Twitter, Instagram, TikTok, Ecommerce Contest Gallery – Upload, Vote, Sell via PayPal or Stripe, Social Share Buttons plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Name and Comment field when commenting on photo gallery entries in all versions up to, and including, 26.0.0.1 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:contest-gallery:contest_gallery:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "26.0.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T06:15Z",
    "lastModifiedDate" : "2025-03-06T17:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1514",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1753",
          "name" : "https://plugins.trac.wordpress.org/browser/profit-products-tables-for-woocommerce/trunk/index.php#L1753",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257043%40profit-products-tables-for-woocommerce&new=3257043%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3257043%40profit-products-tables-for-woocommerce&new=3257043%40profit-products-tables-for-woocommerce&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6edf91de-9553-4aa1-a29f-89771c8e852e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6edf91de-9553-4aa1-a29f-89771c8e852e?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Active Products Tables for WooCommerce. Use constructor to create tables plugin for WordPress is vulnerable to unauthorized filter calling due to insufficient restrictions on the get_smth() function in all versions up to, and including, 1.0.6.7. This makes it possible for unauthenticated attackers to call arbitrary WordPress filters with a single parameter."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-26T09:15Z",
    "lastModifiedDate" : "2025-03-26T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1515",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/home-villa-real-estate-wordpress-theme/19446059",
          "name" : "https://themeforest.net/item/home-villa-real-estate-wordpress-theme/19446059",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/84f08111-d116-46f9-9765-28966e338753?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/84f08111-d116-46f9-9765-28966e338753?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WP Real Estate Manager plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 2.8. This is due to insufficient identity verification on the LinkedIn login request process. This makes it possible for unauthenticated attackers to bypass official authentication and log in as any user on the site, including administrators."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T10:15Z",
    "lastModifiedDate" : "2025-03-05T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1516",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/520553",
          "name" : "GitLab Issue #520553",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/2991435",
          "name" : "HackerOne Bug Bounty Report #2991435",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 8.7 before 17.10.8, 17.11 before 17.11.4, and 18.0 before 18.0.2. Improper input validation in Tokens Names could be used to trigger a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "8.7.0",
          "versionEndExcluding" : "17.10.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.11.0",
          "versionEndExcluding" : "17.11.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "8.7.0",
          "versionEndExcluding" : "17.10.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-12T10:16Z",
    "lastModifiedDate" : "2025-08-08T18:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1517",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/shaonsina/sina-extension-for-elementor/commit/5cb89db08b15a3011800ee0f6ad68c69c5a256d5",
          "name" : "https://github.com/shaonsina/sina-extension-for-elementor/commit/5cb89db08b15a3011800ee0f6ad68c69c5a256d5",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/advanced/sina-countdown.php",
          "name" : "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/advanced/sina-countdown.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/advanced/sina-login-form.php",
          "name" : "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/advanced/sina-login-form.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/basic/sina-fancytext.php",
          "name" : "https://plugins.trac.wordpress.org/browser/sina-extension-for-elementor/trunk/widgets/basic/sina-fancytext.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246221/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246221/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/sina-extension-for-elementor/#developers",
          "name" : "https://wordpress.org/plugins/sina-extension-for-elementor/#developers",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e699f521-9133-41b0-b667-528da78fec06?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e699f521-9133-41b0-b667-528da78fec06?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Sina Extension for Elementor (Slider, Gallery, Form, Modal, Data Table, Tab, Particle, Free Elementor Widgets & Elementor Templates) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Fancy Text, Countdown Widget, and Login Form shortcodes in all versions up to, and including, 3.6.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:sinaextra:sina_extension_for_elementor:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.6.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-26T13:15Z",
    "lastModifiedDate" : "2025-03-24T17:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1520",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/PostHog/posthog/commit/6e8f035f9acd339c5ba87ba6ea40fc1ab3053d42",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-099/",
          "name" : "ZDI-25-099",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PostHog ClickHouse Table Functions SQL Injection Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of PostHog. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the SQL parser. The issue results from the lack of proper validation of a user-supplied string before using it to construct SQL queries. An attacker can leverage this vulnerability to execute code in the context of the database account. Was ZDI-CAN-25350."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:posthog:posthog:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.3.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-07T18:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1521",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/PostHog/posthog/commit/6e8f035f9acd339c5ba87ba6ea40fc1ab3053d42",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-096/",
          "name" : "ZDI-25-096",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PostHog slack_incoming_webhook Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the processing of the slack_incoming_webhook parameter. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to execute code in the context of the service account. Was ZDI-CAN-25352."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:posthog:posthog:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.3.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-07T18:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1522",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/PostHog/posthog/commit/3732c0fd9551ed29521b58611bf1e44d918c1032",
          "name" : "vendor-provided URL",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-097/",
          "name" : "ZDI-25-097",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "PostHog database_schema Server-Side Request Forgery Information Disclosure Vulnerability. This vulnerability allows remote attackers to disclose sensitive information on affected installations of PostHog. Authentication is required to exploit this vulnerability.\n\nThe specific flaw exists within the implementation of the database_schema method. The issue results from the lack of proper validation of a URI prior to accessing resources. An attacker can leverage this vulnerability to disclose information in the context of the service account. Was ZDI-CAN-25358."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:posthog:posthog:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.3.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-23T17:16Z",
    "lastModifiedDate" : "2025-08-07T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1523",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/5a20768f-3128-4b0a-a06b-2247f3e02c99/",
          "name" : "https://wpscan.com/vulnerability/5a20768f-3128-4b0a-a06b-2247f3e02c99/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Dashboard  WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.8.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-17T06:15Z",
    "lastModifiedDate" : "2025-04-29T19:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1524",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/36aed1e4-05cb-42d2-b835-f6336f1a82cd/",
          "name" : "https://wpscan.com/vulnerability/36aed1e4-05cb-42d2-b835-f6336f1a82cd/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Dashboard  WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.8.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-17T06:15Z",
    "lastModifiedDate" : "2025-04-30T15:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1525",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/d457733f-72e9-45e2-ac07-4e1b94e46102/",
          "name" : "https://wpscan.com/vulnerability/d457733f-72e9-45e2-ac07-4e1b94e46102/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Dashboard  WordPress plugin before 3.8.6 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:davidvongries:ultimate_dashboard:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.8.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-17T06:15Z",
    "lastModifiedDate" : "2025-04-30T15:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1526",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/assets/frontend/js/dethemekit-addons.js#L815",
          "name" : "https://plugins.trac.wordpress.org/browser/dethemekit-for-elementor/trunk/assets/frontend/js/dethemekit-addons.js#L815",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255121%40dethemekit-for-elementor&new=3255121%40dethemekit-for-elementor&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3255121%40dethemekit-for-elementor&new=3255121%40dethemekit-for-elementor&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e01ae00-0d07-4e9a-928e-e10cf679df2e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6e01ae00-0d07-4e9a-928e-e10cf679df2e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The DethemeKit for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the De Product Display Widget (countdown feature) in all versions up to, and including, 2.1.9 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:detheme:dethemekit_for_elementor:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.1.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-14T08:15Z",
    "lastModifiedDate" : "2025-03-24T18:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1527",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3253711/woolentor-addons/trunk/includes/modules/flash-sale/assets/js/flash-sale.js",
          "name" : "https://plugins.trac.wordpress.org/changeset/3253711/woolentor-addons/trunk/includes/modules/flash-sale/assets/js/flash-sale.js",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3405b50-a3f0-4280-8a34-ed86ce3d4db4?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d3405b50-a3f0-4280-8a34-ed86ce3d4db4?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ShopLentor – WooCommerce Builder for Elementor & Gutenberg +20 Modules – All in One Solution (formerly WooLentor) plugin for WordPress is vulnerable to a Stored DOM-Based Cross-Site Scripting via the plugin's Flash Sale Countdown module in all versions up to, and including, 3.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hasthemes:shoplentor:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-12T12:15Z",
    "lastModifiedDate" : "2025-03-24T17:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1528",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://searchandfilter.com/search-filter-2-5-20-security-release/",
          "name" : "https://searchandfilter.com/search-filter-2-5-20-security-release/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/47adb5fe-534f-48a9-81a3-883e1d2cda7f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/47adb5fe-534f-48a9-81a3-883e1d2cda7f?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Search & Filter Pro plugin for WordPress is vulnerable to unauthorized access of data due to a missing capability check on the 'get_meta_values' function in all versions up to, and including, 2.5.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to read the values of arbitrary post meta."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-14T05:15Z",
    "lastModifiedDate" : "2025-03-14T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1529",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3278523/am-lottieplayer",
          "name" : "https://plugins.trac.wordpress.org/changeset/3278523/am-lottieplayer",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f44fcc8-c5e0-44f5-92c3-6603b19a06fe?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0f44fcc8-c5e0-44f5-92c3-6603b19a06fe?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AM LottiePlayer plugin for WordPress is vulnerable to Stored Cross-Site Scripting via uploaded lottie files in all versions up to, and including, 3.5.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Author-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-01T12:15Z",
    "lastModifiedDate" : "2025-05-02T13:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1530",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/tripetto/trunk/lib/capabilities.php",
          "name" : "https://plugins.trac.wordpress.org/browser/tripetto/trunk/lib/capabilities.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3251202/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3251202/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3251202/tripetto/trunk/admin/results/list.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3251202/tripetto/trunk/admin/results/list.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3251202/tripetto/trunk/admin/results/results.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3251202/tripetto/trunk/admin/results/results.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/tripetto/#developers",
          "name" : "https://wordpress.org/plugins/tripetto/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd80abd9-3f41-414a-a781-9bff7d85ec4b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd80abd9-3f41-414a-a781-9bff7d85ec4b?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Tripetto plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 8.0.9. This is due to missing nonce validation. This makes it possible for unauthenticated attackers to delete arbitrary results via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tripetto:tripetto:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "8.0.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-15T12:15Z",
    "lastModifiedDate" : "2025-03-25T20:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1531",
        "ASSIGNER" : "hirt@hitachi.co.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-116/index.html",
          "name" : "https://www.hitachi.com/products/it/software/security/info/vuls/hitachi-sec-2025-116/index.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Authentication credentials leakage  vulnerability in Hitachi Ops Center Analyzer viewpoint.This issue affects Hitachi Ops Center Analyzer viewpoint: from 10.0.0-00 before 11.0.4-00."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-16T07:15Z",
    "lastModifiedDate" : "2025-05-16T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1532",
        "ASSIGNER" : "security@hihonor.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.honor.com/global/security/cve-2025-1532/",
          "name" : "https://www.honor.com/global/security/cve-2025-1532/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Phoneservice module is affected by code injection vulnerability, successful exploitation of this vulnerability may affect service confidentiality and integrity."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:honor:phoneservice:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "11.0.0.276",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-04-17T10:15Z",
    "lastModifiedDate" : "2025-07-11T13:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1533",
        "ASSIGNER" : "security@asus.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.asus.com/content/asus-product-security-advisory/",
          "name" : "https://www.asus.com/content/asus-product-security-advisory/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2144",
          "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2144",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A stack buffer overflow has been identified in the AsIO3.sys driver. This vulnerability can be triggered by input manipulation, may leading to a system crash (BSOD) or other potentially undefined execution.\nRefer to the 'Security Update for Armoury Crate App' section on the ASUS Security Advisory for more information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-12T10:15Z",
    "lastModifiedDate" : "2025-05-12T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1534",
        "ASSIGNER" : "security@payara.fish"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.payara.fish/community/docs/6.2025.3/Release%20Notes/Release%20Notes%206.2025.3.html",
          "name" : "https://docs.payara.fish/community/docs/6.2025.3/Release%20Notes/Release%20Notes%206.2025.3.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.24.0.html",
          "name" : "https://docs.payara.fish/enterprise/docs/Release%20Notes/Release%20Notes%206.24.0.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.gruppotim.it/it/footer/red-team.html",
          "name" : "https://www.gruppotim.it/it/footer/red-team.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CVE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Payara Platform Payara Server allows : Remote Code Inclusion.This issue affects Payara Server: from 4.1.2.1919.1 before 4.1.2.191.51, from 5.20.0 before 5.68.0, from 6.0.0 before 6.23.0, from 6.2022.1 before 6.2025.2."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-01T04:15Z",
    "lastModifiedDate" : "2025-04-07T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1535",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sekaino-sakura/CVE/blob/main/CVE_2.md",
          "name" : "https://github.com/sekaino-sakura/CVE/blob/main/CVE_2.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296475",
          "name" : "VDB-296475 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296475",
          "name" : "VDB-296475 | Baiyi Cloud Asset Management System admin.ticket.close.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496969",
          "name" : "Submit #496969 | Hunan Zhonghe Baiyi Information Technology Co., Ltd. Baiyi Cloud Asset Management System /wuser/admin.ticket.close.php SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Baiyi Cloud Asset Management System 8.142.100.161. It has been classified as critical. This affects an unknown part of the file /wuser/admin.ticket.close.php. The manipulation of the argument ticket_id leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-21T12:15Z",
    "lastModifiedDate" : "2025-02-21T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1536",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/koishi0x01/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/koishi0x01/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296476",
          "name" : "VDB-296476 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296476",
          "name" : "VDB-296476 | Raisecom Multi-Service Intelligent Gateway Request Parameter vpn_template_style.php os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497021",
          "name" : "Submit #497021 | Raisecom Technology Co., Ltd. Raisecom Multi-Service Intelligent Gateway vpn_template_style.php Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Raisecom Multi-Service Intelligent Gateway up to 20250208. It has been declared as critical. This vulnerability affects unknown code of the file /vpn/vpn_template_style.php of the component Request Parameter Handler. The manipulation of the argument stylenum leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-21T15:15Z",
    "lastModifiedDate" : "2025-02-21T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1537",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/10IspKbYh7TYmxRPRIQZ7oRg6Xise8ykJ/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/10IspKbYh7TYmxRPRIQZ7oRg6Xise8ykJ/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296477",
          "name" : "VDB-296477 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296477",
          "name" : "VDB-296477 | Harpia DiagSystem atualatendimento_jpeg.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497125",
          "name" : "Submit #497125 | harpia.com.br DiagSystem 12 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Harpia DiagSystem 12. It has been rated as critical. This issue affects some unknown processing of the file /diagsystem/PACS/atualatendimento_jpeg.php. The manipulation of the argument codexame leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-21T15:15Z",
    "lastModifiedDate" : "2025-02-21T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1538",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c",
          "name" : "https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-set_ws_action-Vulnerability-1950448e61958049be3cc606d434bc9d",
          "name" : "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-set_ws_action-Vulnerability-1950448e61958049be3cc606d434bc9d",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-set_ws_action-Vulnerability-1950448e61958049be3cc606d434bc9d?pvs=74",
          "name" : "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-set_ws_action-Vulnerability-1950448e61958049be3cc606d434bc9d?pvs=74",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296479",
          "name" : "VDB-296479 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.296479",
          "name" : "VDB-296479 | D-Link DAP-1320 api set_ws_action heap-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.497301",
          "name" : "Submit #497301 | D-Link DAP-1320 1.00 Heap-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in D-Link DAP-1320 1.00. Affected by this vulnerability is the function set_ws_action of the file /dws/api/. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dap-1320_firmware:1.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dap-1320:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-21T15:15Z",
    "lastModifiedDate" : "2025-02-25T20:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1539",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c",
          "name" : "https://legacy.us.dlink.com/pages/product.aspx?id=4b2bbe2e3f1d440ea65bc56c7e3dcc5c",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-replace_special_char-Vulnerability-1960448e6195809c94f9fd2ff1f59bcf?pvs=4",
          "name" : "https://tasty-foxtrot-3a8.notion.site/D-link-DAP-1320-replace_special_char-Vulnerability-1960448e6195809c94f9fd2ff1f59bcf?pvs=4",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296480",
          "name" : "VDB-296480 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.296480",
          "name" : "VDB-296480 | D-Link DAP-1320 storagein.pd-XXXXXX replace_special_char stack-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.497496",
          "name" : "Submit #497496 | D-Link DAP-1320 1.00 Stack-based Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in D-Link DAP-1320 1.00. Affected by this issue is the function replace_special_char of the file /storagein.pd-XXXXXX. The manipulation leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dap-1320_firmware:1.0:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dap-1320:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-21T15:15Z",
    "lastModifiedDate" : "2025-02-25T20:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1540",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/#saml-authentication-misconfigures-external-user-attribute",
          "name" : "https://about.gitlab.com/releases/2025/02/12/patch-release-gitlab-17-8-2-released/#saml-authentication-misconfigures-external-user-attribute",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/512765",
          "name" : "GitLab Issue #512765",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE for Self-Managed and Dedicated instances affecting all versions from 17.5 prior to 17.6.5, 17.7 prior to 17.7.4, and 17.8 prior to 17.8.2. It was possible for a user added as an External to read and clone internal projects under certain circumstances.\""
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.7.0",
          "versionEndExcluding" : "17.7.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.8.0",
          "versionEndExcluding" : "17.8.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.5.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.5.0",
          "versionEndExcluding" : "17.6.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.2,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-06T09:15Z",
    "lastModifiedDate" : "2025-08-06T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1542",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/03/CVE-2025-1542/",
          "name" : "https://cert.pl/en/posts/2025/03/CVE-2025-1542/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.oxari.com/en/product/oxari-servicedesk",
          "name" : "https://www.oxari.com/en/product/oxari-servicedesk",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper permission control vulnerability in the OXARI ServiceDesk application could allow an attacker using a guest access or an unprivileged account to gain additional administrative permissions in the application.This issue affects OXARI ServiceDesk in versions before 2.0.324.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-26T11:15Z",
    "lastModifiedDate" : "2025-03-26T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1543",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          }, {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/PathTraversal-UeditorResource.md",
          "name" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/PathTraversal-UeditorResource.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296489",
          "name" : "VDB-296489 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296489",
          "name" : "VDB-296489 | iteachyou Dreamer CMS ueditor-1.4.3.3 path traversal",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497329",
          "name" : "Submit #497329 | iteachyou Dreamer CMS 4.1.3 Path Traversal",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in iteachyou Dreamer CMS 4.1.3. This issue affects some unknown processing of the file /resource/js/ueditor-1.4.3.3. The manipulation leads to path traversal. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-21T16:15Z",
    "lastModifiedDate" : "2025-04-04T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1544",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/XinCaoZ/cve/blob/main/dingfanzu/dingfanzu-CMS%20loadShopInfo.php%20shopId%20SQL%20inject.md",
          "name" : "https://github.com/XinCaoZ/cve/blob/main/dingfanzu/dingfanzu-CMS%20loadShopInfo.php%20shopId%20SQL%20inject.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296490",
          "name" : "VDB-296490 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296490",
          "name" : "VDB-296490 | dingfanzu CMS loadShopInfo.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497477",
          "name" : "Submit #497477 | geeeeeeeek dingfanzu master SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in dingfanzu CMS up to 20250210. Affected is an unknown function of the file /ajax/loadShopInfo.php. The manipulation of the argument shopId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-21T16:15Z",
    "lastModifiedDate" : "2025-02-21T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1546",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/koishi0x01/CVE/blob/main/CVE_2.md",
          "name" : "https://github.com/koishi0x01/CVE/blob/main/CVE_2.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296491",
          "name" : "VDB-296491 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296491",
          "name" : "VDB-296491 | BDCOM Behavior Management and Auditing System operate.mds log_operate_clear os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497558",
          "name" : "Submit #497558 | Shanghai Baud DATA Communicatior Co., Ltd. Internet Behavior Management and Auditing System log_operate_clear Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in BDCOM Behavior Management and Auditing System up to 20250210 and classified as critical. Affected by this vulnerability is the function log_operate_clear of the file /webui/modules/log/operate.mds. The manipulation of the argument start_code leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-21T17:15Z",
    "lastModifiedDate" : "2025-02-21T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1548",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/RemoteFileInclusion-ArticleEditorImageUpload.md",
          "name" : "https://github.com/cydtseng/Vulnerability-Research/blob/main/dreamercms/RemoteFileInclusion-ArticleEditorImageUpload.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296494",
          "name" : "VDB-296494 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296494",
          "name" : "VDB-296494 | iteachyou Dreamer CMS edit cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497602",
          "name" : "Submit #497602 | iteachyou Dreamer CMS 4.1.3 Remote File Inclusion",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in iteachyou Dreamer CMS 4.1.3. It has been declared as problematic. This vulnerability affects unknown code of the file /admin/archives/edit. The manipulation of the argument editorValue/answer/content leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:iteachyou:dreamer_cms:4.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-02-21T17:15Z",
    "lastModifiedDate" : "2025-04-04T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1550",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/keras-team/keras/pull/20751",
          "name" : "https://github.com/keras-team/keras/pull/20751",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Patch" ]
        }, {
          "url" : "https://towerofhanoi.it/writeups/cve-2025-1550/",
          "name" : "https://towerofhanoi.it/writeups/cve-2025-1550/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Keras Model.load_model function permits arbitrary code execution, even with safe_mode=True, through a manually constructed, malicious .keras archive. By altering the config.json file within the archive, an attacker can specify arbitrary Python modules and functions, along with their arguments, to be loaded and executed during model loading."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:keras:keras:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "3.0.0",
          "versionEndExcluding" : "3.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-11T09:15Z",
    "lastModifiedDate" : "2025-07-31T16:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1551",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232032",
          "name" : "https://www.ibm.com/support/pages/node/7232032",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Operational Decision Manager 8.11.0.1, 8.11.1.0, 8.12.0.1, and 9.0.0.1 is vulnerable to cross-site scripting. This vulnerability allows an unauthenticated attacker to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:8.11.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:8.12.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:8.11.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:operational_decision_manager:9.0.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-29T16:15Z",
    "lastModifiedDate" : "2025-05-12T21:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1553",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.google.com/document/d/1r8Ad7Kaw0bwKZMVFDlhzhpjdque7vRGTDKDeP7yiUEc",
          "name" : "https://docs.google.com/document/d/1r8Ad7Kaw0bwKZMVFDlhzhpjdque7vRGTDKDeP7yiUEc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://docs.google.com/document/d/1r8Ad7Kaw0bwKZMVFDlhzhpjdque7vRGTDKDeP7yiUEc/edit?tab=t.0#heading=h.ukpd7mmeqiqp",
          "name" : "https://docs.google.com/document/d/1r8Ad7Kaw0bwKZMVFDlhzhpjdque7vRGTDKDeP7yiUEc/edit?tab=t.0#heading=h.ukpd7mmeqiqp",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/1CRdzTf2bPEB7MshIighYYcVL3IbArBPr/view",
          "name" : "https://drive.google.com/file/d/1CRdzTf2bPEB7MshIighYYcVL3IbArBPr/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296502",
          "name" : "VDB-296502 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296502",
          "name" : "VDB-296502 | pankajindevops scale project cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.491216",
          "name" : "Submit #491216 | https://github.com/pankajindevops/scale Scale latest Stored Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in pankajindevops scale up to 3633544a00245d3df88b6d13d9b3dd0f411be7f6. It has been classified as problematic. Affected is an unknown function of the file /scale/project. The manipulation of the argument goal leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-22T10:15Z",
    "lastModifiedDate" : "2025-02-24T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1555",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/bnhiMg%3D%3D.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296506",
          "name" : "VDB-296506 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296506",
          "name" : "VDB-296506 | hzmanyun Education and Training System saveImage unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.496932",
          "name" : "Submit #496932 | hzmanyun education and training system v3.1.1 RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. This vulnerability affects the function saveImage. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-21T21:15Z",
    "lastModifiedDate" : "2025-02-24T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1556",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/FightingLzn9/vul/blob/main/CicadasCMS(2).md",
          "name" : "https://github.com/FightingLzn9/vul/blob/main/CicadasCMS(2).md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296507",
          "name" : "VDB-296507 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296507",
          "name" : "VDB-296507 | westboy CicadasCMS Template Management system deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.499520",
          "name" : "Submit #499520 | westboy CicadasCMS 1.0 Server-Side Template Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in westboy CicadasCMS 1.0. This issue affects some unknown processing of the file /system of the component Template Management. The manipulation leads to deserialization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-22T13:15Z",
    "lastModifiedDate" : "2025-02-22T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1557",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296508",
          "name" : "VDB-296508 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296508",
          "name" : "VDB-296508 | OFCMS cross-site request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.500269",
          "name" : "Submit #500269 | ofcms 1.1.3 CSRF",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/kq7117ogyycutxo2?singleDoc#%20%E3%80%8ACSRF%20Vulnerability%20in%20OfCms%20%2F%20OfCms%E5%AD%98%E5%9C%A8CSRF%E6%BC%8F%E6%B4%9E%E3%80%8B",
          "name" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/kq7117ogyycutxo2?singleDoc#%20%E3%80%8ACSRF%20Vulnerability%20in%20OfCms%20%2F%20OfCms%E5%AD%98%E5%9C%A8CSRF%E6%BC%8F%E6%B4%9E%E3%80%8B",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in OFCMS 1.1.3. Affected is an unknown function. The manipulation leads to cross-site request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ofcms_project:ofcms:1.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-22T13:15Z",
    "lastModifiedDate" : "2025-06-04T19:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1558",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Mobile Apps versions <=2.25.0 fail to properly validate GIF images prior to rendering which allows a malicious user to cause the Android application to crash via message containing a maliciously crafted GIF."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-24T15:15Z",
    "lastModifiedDate" : "2025-03-24T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1559",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/cc-img-shortcode/trunk/includes/class-img-shortcode.php",
          "name" : "https://plugins.trac.wordpress.org/browser/cc-img-shortcode/trunk/includes/class-img-shortcode.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/cc-img-shortcode/",
          "name" : "https://wordpress.org/plugins/cc-img-shortcode/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/81803a24-51ba-4d23-88ef-553cb4754977?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/81803a24-51ba-4d23-88ef-553cb4754977?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The CC-IMG-Shortcode plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'img' shortcode in all versions up to, and including, 1.1.0 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-13T02:15Z",
    "lastModifiedDate" : "2025-03-13T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1560",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wow-entrance-effects-wee/trunk/wee.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wow-entrance-effects-wee/trunk/wee.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://wordpress.org/plugins/wow-entrance-effects-wee/",
          "name" : "https://wordpress.org/plugins/wow-entrance-effects-wee/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/423e840e-0bc2-4481-afff-61ace85788d3?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/423e840e-0bc2-4481-afff-61ace85788d3?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WOW Entrance Effects (WEE!) plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'wee' shortcode in all versions up to, and including, 0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:darkosxrc:wow_entrance_effects_\\(wee\\!\\):0.1:*:*:*:*:wordpress:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T09:15Z",
    "lastModifiedDate" : "2025-03-06T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1561",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/apppresser/tags/4.4.10/templates/template.php#L32",
          "name" : "https://plugins.trac.wordpress.org/browser/apppresser/tags/4.4.10/templates/template.php#L32",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3254632/apppresser/tags/4.4.11/inc/AppPresser_Log_Admin.php?old=3219464&old_path=apppresser%2Ftags%2F4.4.10%2Finc%2FAppPresser_Log_Admin.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3254632/apppresser/tags/4.4.11/inc/AppPresser_Log_Admin.php?old=3219464&old_path=apppresser%2Ftags%2F4.4.10%2Finc%2FAppPresser_Log_Admin.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/77328e35-b6e6-40eb-8c85-896d54419aef?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/77328e35-b6e6-40eb-8c85-896d54419aef?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The AppPresser – Mobile App Framework plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'title' parameter in all versions up to, and including, 4.4.10 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages when logging is enabled that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apppresser:apppresser:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.4.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-13T05:15Z",
    "lastModifiedDate" : "2025-05-26T02:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1562",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/2.5.0/includes/api/plugin_status/class-bwfan-api-install-and-activate-plugin.php",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/2.5.0/includes/api/plugin_status/class-bwfan-api-install-and-activate-plugin.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/2.5.0/includes/class-bwfan-db.php#L153",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-marketing-automations/tags/2.5.0/includes/class-bwfan-db.php#L153",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/admin/class-bwfan-admin.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/admin/class-bwfan-admin.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/abstracts/class-bwfan-api-base.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/abstracts/class-bwfan-api-base.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/class-bwfan-api-loader.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3305437/wp-marketing-automations/trunk/includes/class-bwfan-api-loader.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/094972e6-7e02-4060-b069-e39c8cde9331?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/094972e6-7e02-4060-b069-e39c8cde9331?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Recover WooCommerce Cart Abandonment, Newsletter, Email Marketing, Marketing Automation By FunnelKit plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_or_activate_addon_plugins() function and a weak nonce hash in all versions up to, and including, 3.5.3. This makes it possible for unauthenticated attackers to install arbitrary plugins on the site that can be leveraged to further infect a vulnerable site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:funnelkit:funnelkit_automations:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.6.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-18T08:15Z",
    "lastModifiedDate" : "2025-07-09T18:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1564",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/setsail-travel-agency-theme/22832625",
          "name" : "https://themeforest.net/item/setsail-travel-agency-theme/22832625",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2c2385e-0d1e-435a-9b82-972964084148?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c2c2385e-0d1e-435a-9b82-972964084148?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SetSail Membership plugin for WordPress is vulnerable to  in all versions up to, and including, 1.0.3. This is due to the plugin not properly verifying a users identity through the social login. This makes it possible for unauthenticated attackers to log in as any user, including administrators and take over access to their account."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-01T08:15Z",
    "lastModifiedDate" : "2025-03-01T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1565",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/mayosis-digital-marketplace-theme/20210200",
          "name" : "https://themeforest.net/item/mayosis-digital-marketplace-theme/20210200",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b967eb98-69f8-41c5-a19a-9d20979accb0?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b967eb98-69f8-41c5-a19a-9d20979accb0?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Mayosis Core plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 5.4.1 via the library/wave-audio/peaks/remote_dl.php file. This makes it possible for unauthenticated attackers to read the contents of arbitrary files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-25T10:15Z",
    "lastModifiedDate" : "2025-04-25T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1566",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/342802975",
          "name" : "https://issues.chromium.org/issues/b/342802975",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://issuetracker.google.com/issues/342802975",
          "name" : "https://issuetracker.google.com/issues/342802975",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Mailing List" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "DNS Leak in Native System VPN in Google ChromeOS Dev Channel on ChromeOS 16002.23.0 allows network observers to expose plaintext DNS queries via failure to properly tunnel DNS traffic during VPN state transitions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:google:chrome_os:16002.23.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T23:15Z",
    "lastModifiedDate" : "2025-07-08T18:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1568",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/374279912",
          "name" : "https://issues.chromium.org/issues/b/374279912",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://issuetracker.google.com/issues/374279912",
          "name" : "https://issuetracker.google.com/issues/374279912",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Mailing List" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Access Control Vulnerability in Gerrit chromiumos project configuration in Google ChromeOS 16063.87.0 allows an attacker with a registered Gerrit account to inject malicious code into ChromeOS projects and potentially achieve Remote Code Execution and Denial of Service via editing trusted pipelines by insufficient access controls and misconfigurations in Gerrit's project.config."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:google:chrome_os:16063.87.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T23:15Z",
    "lastModifiedDate" : "2025-07-08T18:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1569",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1570",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-640"
          }, {
            "lang" : "en",
            "value" : "CWE-640"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246340/directorist",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246340/directorist",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/853562ed-7f2e-453c-b3d0-67c90bd0231f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/853562ed-7f2e-453c-b3d0-67c90bd0231f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Directorist: AI-Powered Business Directory Plugin with Classified Ads Listings plugin for WordPress is vulnerable to privilege escalation via account takeover in all versions up to, and including, 8.1. This is due to the directorist_generate_password_reset_pin_code() and reset_user_password() functions not having enough controls to prevent a successful brute force attack of the OTP to change a password, or verify that a password reset request came from an authorized user. This makes it possible for unauthenticated attackers to generate and brute force an OTP that makes it possible to change any users passwords, including an administrator."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpwax:directorist:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "8.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T09:15Z",
    "lastModifiedDate" : "2025-03-06T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1571",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3245128/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3245128/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers",
          "name" : "https://wordpress.org/plugins/exclusive-addons-for-elementor/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd2ec0b3-2784-4506-99f4-05187527fe6d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd2ec0b3-2784-4506-99f4-05187527fe6d?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Exclusive Addons for Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's Animated Text and Image Comparison Widgets in all versions up to, and including, 2.7.6 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:exclusiveaddons:exclusive_addons_for_elementor:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.7.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T07:15Z",
    "lastModifiedDate" : "2025-02-28T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1572",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php#L330",
          "name" : "https://plugins.trac.wordpress.org/browser/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php#L330",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php#L331",
          "name" : "https://plugins.trac.wordpress.org/browser/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php#L331",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3245759/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3245759/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3245759/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3245759/kivicare-clinic-management-system/trunk/app/controllers/KCPatientController.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/kivicare-clinic-management-system/#developers",
          "name" : "https://wordpress.org/plugins/kivicare-clinic-management-system/#developers",
          "refsource" : "",
          "tags" : [ "Product", "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6b0c35-b478-4616-a708-1fd243c95c14?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/eb6b0c35-b478-4616-a708-1fd243c95c14?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The KiviCare – Clinic & Patient Management System (EHR) plugin for WordPress is vulnerable to SQL Injection via the ‘u_id’ parameter in all versions up to, and including, 3.6.7 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with doctor-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:iqonic:kivicare:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.6.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T08:15Z",
    "lastModifiedDate" : "2025-03-06T17:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1573",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1575",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-99"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1zBAwcqfv6-HvDQg6ch3ywbllo0VlLIoQ/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1zBAwcqfv6-HvDQg6ch3ywbllo0VlLIoQ/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296550",
          "name" : "VDB-296550 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296550",
          "name" : "VDB-296550 | Harpia DiagSystem atualatendimento_jpeg.php resource injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497083",
          "name" : "Submit #497083 | harpia.com.br DiagSytem 12 Insecure Direct Object Reference(IDOR)",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Harpia DiagSystem 12. Affected is an unknown function of the file /diagsystem/PACS/atualatendimento_jpeg.php. The manipulation of the argument cod/codexame leads to improper control of resource identifiers. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-23T04:15Z",
    "lastModifiedDate" : "2025-02-23T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1576",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/fjl1113/cve/blob/main/sql-fjl.md",
          "name" : "https://github.com/fjl1113/cve/blob/main/sql-fjl.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296551",
          "name" : "VDB-296551 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296551",
          "name" : "VDB-296551 | code-projects Real Estate Property Management System ajax_state.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502071",
          "name" : "Submit #502071 | code-projects Real Estate Property Management System php 1/0 SQL INJECTION",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in code-projects Real Estate Property Management System 1.0. Affected by this vulnerability is an unknown functionality of the file /ajax_state.php. The manipulation of the argument StateName as part of String leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:fabianros:real_estate_property_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T05:15Z",
    "lastModifiedDate" : "2025-03-03T16:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1577",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/heiheiworld/cve/blob/main/xss-h.md",
          "name" : "https://github.com/heiheiworld/cve/blob/main/xss-h.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296552",
          "name" : "VDB-296552 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296552",
          "name" : "VDB-296552 | code-projects Blood Bank System prostatus.php cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502087",
          "name" : "Submit #502087 | code-projects blood-bank-system-in-php  0/1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank System 1.0. Affected by this issue is some unknown functionality of the file /prostatus.php. The manipulation of the argument message leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T07:15Z",
    "lastModifiedDate" : "2025-03-03T16:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1578",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/panghuanjie/Code-audits/blob/main/PHPGurukul%20Online%20Shopping%20Portal%20v2.1%20Foreground%20SQL%20Injection%20Vulnerability2.pdf",
          "name" : "https://github.com/panghuanjie/Code-audits/blob/main/PHPGurukul%20Online%20Shopping%20Portal%20v2.1%20Foreground%20SQL%20Injection%20Vulnerability2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296553",
          "name" : "VDB-296553 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296553",
          "name" : "VDB-296553 | PHPGurukul/Campcodes Online Shopping Portal search-result.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502391",
          "name" : "Submit #502391 | PHPGurukul Online Shopping Portal V2.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in PHPGurukul/Campcodes Online Shopping Portal 2.1. This affects an unknown part of the file /search-result.php. The manipulation of the argument Product leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:online_shopping_portal:2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-23T08:15Z",
    "lastModifiedDate" : "2025-05-16T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1579",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/R2og/cve/blob/main/xss-r2og.md",
          "name" : "https://github.com/R2og/cve/blob/main/xss-r2og.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296555",
          "name" : "VDB-296555 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296555",
          "name" : "VDB-296555 | code-projects Blood Bank System user.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502876",
          "name" : "Submit #502876 | code-projects blood-bank-system-in-php  0/1 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Blood Bank System 1.0 and classified as problematic. This issue affects some unknown processing of the file /admin/user.php. The manipulation of the argument email leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T09:15Z",
    "lastModifiedDate" : "2025-03-03T16:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1580",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wqywfvc/CVE/issues/5",
          "name" : "https://github.com/wqywfvc/CVE/issues/5",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296556",
          "name" : "VDB-296556 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296556",
          "name" : "VDB-296556 | PHPGurukul Nipah Virus Testing Management System search-report-result.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504234",
          "name" : "Submit #504234 | PHPGurukul Niv-tms project V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Nipah Virus Testing Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /search-report-result.php. The manipulation of the argument searchdata leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting parameter names to be affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:nipah_virus_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T10:15Z",
    "lastModifiedDate" : "2025-05-07T17:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1581",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wqywfvc/CVE/issues/10",
          "name" : "https://github.com/wqywfvc/CVE/issues/10",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296557",
          "name" : "VDB-296557 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296557",
          "name" : "VDB-296557 | PHPGurukul Online Nurse Hiring System book-nurse.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504450",
          "name" : "Submit #504450 | Phpgurukul ONHS project php V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Online Nurse Hiring System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /book-nurse.php?bookid=1. The manipulation of the argument contactname leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T11:15Z",
    "lastModifiedDate" : "2025-02-28T19:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1582",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wqywfvc/CVE/issues/11",
          "name" : "https://github.com/wqywfvc/CVE/issues/11",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296558",
          "name" : "VDB-296558 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296558",
          "name" : "VDB-296558 | PHPGurukul Online Nurse Hiring System all-request.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504451",
          "name" : "Submit #504451 | Phpgurukul ONHS project php V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Online Nurse Hiring System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /admin/all-request.php. The manipulation of the argument viewid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T12:15Z",
    "lastModifiedDate" : "2025-02-28T19:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1583",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wqywfvc/CVE/issues/12",
          "name" : "https://github.com/wqywfvc/CVE/issues/12",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296559",
          "name" : "VDB-296559 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296559",
          "name" : "VDB-296559 | PHPGurukul Online Nurse Hiring System search-report-details.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504452",
          "name" : "Submit #504452 | Phpgurukul ONHS project php V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in PHPGurukul Online Nurse Hiring System 1.0. This affects an unknown part of the file /admin/search-report-details.php. The manipulation of the argument searchinput leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T12:15Z",
    "lastModifiedDate" : "2025-02-28T19:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1584",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          }, {
            "lang" : "en",
            "value" : "CWE-24"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/opensolon/solon/commit/f46e47fd1f8455b9467d7ead3cdb0509115b2ef1",
          "name" : "https://github.com/opensolon/solon/commit/f46e47fd1f8455b9467d7ead3cdb0509115b2ef1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/opensolon/solon/issues/332",
          "name" : "https://github.com/opensolon/solon/issues/332",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/opensolon/solon/issues/332#issue-2866229828",
          "name" : "https://github.com/opensolon/solon/issues/332#issue-2866229828",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/opensolon/solon/issues/332#issuecomment-2674330700",
          "name" : "https://github.com/opensolon/solon/issues/332#issuecomment-2674330700",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296560",
          "name" : "VDB-296560 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296560",
          "name" : "VDB-296560 | opensolon Solon StaticMappings.java path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.504454",
          "name" : "Submit #504454 | Solon 3.0.8 Files or Directories Accessible",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in opensolon Solon up to 3.0.8. This vulnerability affects unknown code of the file solon-projects/solon-web/solon-web-staticfiles/src/main/java/org/noear/solon/web/staticfiles/StaticMappings.java. The manipulation leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.0.9 is able to address this issue. The name of the patch is f46e47fd1f8455b9467d7ead3cdb0509115b2ef1. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-23T13:15Z",
    "lastModifiedDate" : "2025-02-23T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1585",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/dragonkeep/cve/blob/main/Tale_Blog_xss.md",
          "name" : "https://github.com/dragonkeep/cve/blob/main/Tale_Blog_xss.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296561",
          "name" : "VDB-296561 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296561",
          "name" : "VDB-296561 | otale header.html OptionsService cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.504937",
          "name" : "Submit #504937 | https://github.com/otale/tale Tale Blog v2.0.5 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in otale tale up to 2.0.5. This issue affects the function OptionsService of the file src/main/resources/templates/themes/default/partial/header.html. The manipulation of the argument logo_url leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-23T14:15Z",
    "lastModifiedDate" : "2025-02-23T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1586",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/1337g/bloodbanksystem_poc/blob/main/xss-gu(1).pdf",
          "name" : "https://github.com/1337g/bloodbanksystem_poc/blob/main/xss-gu(1).pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296566",
          "name" : "VDB-296566 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296566",
          "name" : "VDB-296566 | code-projects Blood Bank System A-.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505124",
          "name" : "Submit #505124 | code-projects blood-bank-system v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Blood Bank System 1.0. It has been declared as problematic. This vulnerability affects unknown code of the file /Blood/A-.php. The manipulation of the argument Bloodname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T15:15Z",
    "lastModifiedDate" : "2025-02-28T19:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1587",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wshRE/CVE/issues/1",
          "name" : "https://github.com/wshRE/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296567",
          "name" : "VDB-296567 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296567",
          "name" : "VDB-296567 | SourceCodester Telecom Billing Management System Add New Record main.cpp addrecords buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505363",
          "name" : "Submit #505363 | SourceCodester Telecom Billing Management System  V1.0 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Telecom Billing Management System 1.0. It has been rated as critical. This issue affects the function addrecords of the file main.cpp of the component Add New Record. The manipulation of the argument name/phonenumber leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:razormist:telecom_billing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T15:15Z",
    "lastModifiedDate" : "2025-05-14T21:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1588",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          }, {
            "lang" : "en",
            "value" : "CWE-24"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/wqywfvc/CVE/issues/16",
          "name" : "https://github.com/wqywfvc/CVE/issues/16",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296572",
          "name" : "VDB-296572 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296572",
          "name" : "VDB-296572 | PHPGurukul Online Nurse Hiring System manage-nurse.php path traversal",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505441",
          "name" : "Submit #505441 | PHPGurukul ONHS Project PHP V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in PHPGurukul Online Nurse Hiring System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/manage-nurse.php. The manipulation of the argument profilepic leads to path traversal: '../filedir'. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The initial researcher advisory mentions contradicting vulnerability classes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:online_nurse_hiring_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-23T16:15Z",
    "lastModifiedDate" : "2025-02-28T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1589",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296573",
          "name" : "VDB-296573 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296573",
          "name" : "VDB-296573 | SourceCodester E-Learning System User Registration register.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504039",
          "name" : "Submit #504039 | SourceCodester E-Learning System Using PHP/MySQLi with Source Code Submitted December 28, 2020 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester E-Learning System 1.0 and classified as problematic. This issue affects some unknown processing of the file /register.php of the component User Registration Handler. The manipulation leads to cross site scripting. The attack may be initiated remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:janobe:e-learning_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T18:15Z",
    "lastModifiedDate" : "2025-02-28T19:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1590",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296574",
          "name" : "VDB-296574 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296574",
          "name" : "VDB-296574 | SourceCodester E-Learning System List of Lessons Page index.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.504045",
          "name" : "Submit #504045 | SourceCodester E-Learning System Using PHP/MySQLi with Source Code Submitted December 28, 2020 Code Execution",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester E-Learning System 1.0. It has been classified as critical. Affected is an unknown function of the file /admin/modules/lesson/index.php of the component List of Lessons Page. The manipulation leads to unrestricted upload. It is possible to launch the attack remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:janobe:e-learning_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T19:15Z",
    "lastModifiedDate" : "2025-02-28T19:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1591",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296575",
          "name" : "VDB-296575 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296575",
          "name" : "VDB-296575 | SourceCodester Employee Management System Department Page department.php cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.504048",
          "name" : "Submit #504048 | sourcecodester Employee Management System Using PHP and MySQL Submitted January 14 2025 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Employee Management System 1.0. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the file /department.php of the component Department Page. The manipulation of the argument Department Name leads to cross site scripting. The attack can be launched remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:razormist:employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T19:15Z",
    "lastModifiedDate" : "2025-02-28T19:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1592",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296576",
          "name" : "VDB-296576 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.296576",
          "name" : "VDB-296576 | SourceCodester Best Employee Management System Add Role Page Role.php cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.505210",
          "name" : "Submit #505210 | SourceCodester Employee Management System Submitted November 3, 2024 - 02:56. Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Employee Management System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/Operations/Role.php of the component Add Role Page. The manipulation of the argument assign_name/description leads to cross site scripting. The attack may be launched remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T20:15Z",
    "lastModifiedDate" : "2025-02-28T19:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1593",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296577",
          "name" : "VDB-296577 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296577",
          "name" : "VDB-296577 | SourceCodester Best Employee Management System Profile Picture unrestricted upload",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505212",
          "name" : "Submit #505212 | SourceCodester Employee Management System Submitted November 3, 2024 - 02:56. Code Execution",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in SourceCodester Best Employee Management System 1.0. This affects an unknown part of the file /_hr_soft/assets/uploadImage/Profile/ of the component Profile Picture Handler. The manipulation leads to unrestricted upload. It is possible to initiate the attack remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T20:15Z",
    "lastModifiedDate" : "2025-02-28T19:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1594",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          }, {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://ffmpeg.org/",
          "name" : "https://ffmpeg.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://trac.ffmpeg.org/attachment/ticket/11418/poc",
          "name" : "https://trac.ffmpeg.org/attachment/ticket/11418/poc",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://trac.ffmpeg.org/ticket/11418#comment:3",
          "name" : "https://trac.ffmpeg.org/ticket/11418#comment:3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296589",
          "name" : "VDB-296589 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296589",
          "name" : "VDB-296589 | FFmpeg AAC Encoder aacenc_tns.c ff_aac_search_for_tns stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496929",
          "name" : "Submit #496929 | FFmpeg git master stack-buffer-overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in FFmpeg up to 7.1. This affects the function ff_aac_search_for_tns of the file libavcodec/aacenc_tns.c of the component AAC Encoder. The manipulation leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ffmpeg:ffmpeg:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "7.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T21:15Z",
    "lastModifiedDate" : "2025-06-03T18:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1595",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/MH521/POC/blob/main/EasyCVR-%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getbaseconfig%E6%8E%A5%E5%8F%A3%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
          "name" : "https://github.com/MH521/POC/blob/main/EasyCVR-%E8%A7%86%E9%A2%91%E7%AE%A1%E7%90%86%E5%B9%B3%E5%8F%B0getbaseconfig%E6%8E%A5%E5%8F%A3%E6%9C%AA%E6%8E%88%E6%9D%83%E8%AE%BF%E9%97%AE.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296590",
          "name" : "VDB-296590 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296590",
          "name" : "VDB-296590 | Anhui Xufan Information Technology EasyCVR getbaseconfig information disclosure",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.497485",
          "name" : "Submit #497485 | ???????????? EasyCVR-?????? ?? Use of Java I/O",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Anhui Xufan Information Technology EasyCVR up to 2.7.0 and classified as problematic. This vulnerability affects unknown code of the file /api/v1/getbaseconfig. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-23T22:15Z",
    "lastModifiedDate" : "2025-02-23T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1596",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-sql.md",
          "name" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-sql.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296591",
          "name" : "VDB-296591 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296591",
          "name" : "VDB-296591 | SourceCodester Best Church Management Software fpassword.php sql injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.497868",
          "name" : "Submit #497868 | mayuri_k Best church management software 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.0 and classified as critical. This issue affects some unknown processing of the file /fpassword.php. The manipulation of the argument email leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-23T23:15Z",
    "lastModifiedDate" : "2025-02-28T19:06Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1597",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-xss.md",
          "name" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-xss.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296592",
          "name" : "VDB-296592 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296592",
          "name" : "VDB-296592 | SourceCodester Best Church Management Software redirect.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497883",
          "name" : "Submit #497883 | mayuri_k Best church management software 1.0 Doubled Character XSS Manipulations",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been classified as problematic. Affected is an unknown function of the file /admin/redirect.php. The manipulation of the argument a leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-23T23:15Z",
    "lastModifiedDate" : "2025-02-28T19:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1598",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-Arbitrary-File-Upload.md",
          "name" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-Arbitrary-File-Upload.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296593",
          "name" : "VDB-296593 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296593",
          "name" : "VDB-296593 | SourceCodester Best Church Management Software asset_crud.php unrestricted upload",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.497891",
          "name" : "Submit #497891 | mayuri_k Best church management software 1.0 Unrestricted Upload",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/asset_crud.php. The manipulation of the argument photo1 leads to unrestricted upload. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-24T00:15Z",
    "lastModifiedDate" : "2025-02-28T19:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1599",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          }, {
            "lang" : "en",
            "value" : "CWE-24"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-Delete-any-file.md",
          "name" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/best-church-management-software-Delete-any-file.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296594",
          "name" : "VDB-296594 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296594",
          "name" : "VDB-296594 | SourceCodester Best Church Management Software profile_crud.php path traversal",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.498188",
          "name" : "Submit #498188 | mayuri_k Best church management software 1.0 Delete any file",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in SourceCodester Best Church Management Software 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /admin/app/profile_crud.php. The manipulation of the argument old_cat_img leads to path traversal: '../filedir'. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-24T00:15Z",
    "lastModifiedDate" : "2025-03-03T16:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1606",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Best-employee-management-system-information-leakage.md",
          "name" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Best-employee-management-system-information-leakage.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296596",
          "name" : "VDB-296596 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296596",
          "name" : "VDB-296596 | SourceCodester Best Employee Management System backups.php information disclosure",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.498421",
          "name" : "Submit #498421 | mayuri_k Best employee management system 1.0 Information Disclosure",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in SourceCodester Best Employee Management System 1.0. This vulnerability affects unknown code of the file /admin/backup/backups.php. The manipulation leads to information disclosure. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-24T00:15Z",
    "lastModifiedDate" : "2025-02-28T18:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1607",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          }, {
            "lang" : "en",
            "value" : "CWE-285"
          }, {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Best-employee-management-system-unauthorized-access.md",
          "name" : "https://github.com/xiahao90/CVEproject/blob/main/xiahao.webray.com.cn/Best-employee-management-system-unauthorized-access.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296597",
          "name" : "VDB-296597 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296597",
          "name" : "VDB-296597 | SourceCodester Best Employee Management System salary_slip.php authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.498432",
          "name" : "Submit #498432 | mayuri_k Best employee management system 1.0 Exposure of Access Control List Files to an Unauthorized Control",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in SourceCodester Best Employee Management System 1.0. This issue affects some unknown processing of the file /admin/salary_slip.php. The manipulation of the argument id leads to authorization bypass. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-24T01:15Z",
    "lastModifiedDate" : "2025-05-14T21:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1608",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://noisy-caravel-a9a.notion.site/LBLINK_AC1900_V1-0-2_-set_manpwd-_-bl_do_system-_CI-179898c94eac81b9bf56c1f64db77e2d?pvs=74",
          "name" : "https://noisy-caravel-a9a.notion.site/LBLINK_AC1900_V1-0-2_-set_manpwd-_-bl_do_system-_CI-179898c94eac81b9bf56c1f64db77e2d?pvs=74",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296598",
          "name" : "VDB-296598 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296598",
          "name" : "VDB-296598 | LB-LINK AC1900 Router set_manpwd websGetVar os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501022",
          "name" : "Submit #501022 | LB-LINK LB-LINK AC1900 router V1.0.2 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in LB-LINK AC1900 Router 1.0.2. Affected is the function websGetVar of the file /goform/set_manpwd. The manipulation of the argument routepwd  leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-24T01:15Z",
    "lastModifiedDate" : "2025-02-24T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1609",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://noisy-caravel-a9a.notion.site/LBLINK_AC1900_V1-0-2_-set_cmd-_-bs_SetCmd-_CI-179898c94eac808e8875e0b8e1bee47e?pvs=74",
          "name" : "https://noisy-caravel-a9a.notion.site/LBLINK_AC1900_V1-0-2_-set_cmd-_-bs_SetCmd-_CI-179898c94eac808e8875e0b8e1bee47e?pvs=74",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296599",
          "name" : "VDB-296599 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296599",
          "name" : "VDB-296599 | LB-LINK AC1900 Router set_cmd websGetVar os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501023",
          "name" : "Submit #501023 | LB-LINK LB-LINK AC1900 router V1.0.2 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in LB-LINK AC1900 Router 1.0.2 and classified as critical. Affected by this vulnerability is the function websGetVar of the file /goform/set_cmd. The manipulation of the argument cmd leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-24T02:15Z",
    "lastModifiedDate" : "2025-02-24T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1610",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://noisy-caravel-a9a.notion.site/LBLINK_AC1900_V1-0-2_-set_blacklist-_-bs_SetMacBlack-_CI-179898c94eac802b9451fcb79aa668c3?pvs=74",
          "name" : "https://noisy-caravel-a9a.notion.site/LBLINK_AC1900_V1-0-2_-set_blacklist-_-bs_SetMacBlack-_CI-179898c94eac802b9451fcb79aa668c3?pvs=74",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296600",
          "name" : "VDB-296600 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296600",
          "name" : "VDB-296600 | LB-LINK AC1900 Router set_blacklist websGetVar os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501024",
          "name" : "Submit #501024 | LB-LINK LB-LINK AC1900 router V1.0.2 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in LB-LINK AC1900 Router 1.0.2 and classified as critical. Affected by this issue is the function websGetVar of the file /goform/set_blacklist. The manipulation of the argument mac/enable leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-24T02:15Z",
    "lastModifiedDate" : "2025-02-24T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1611",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-74"
          }, {
            "lang" : "en",
            "value" : "CWE-707"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/jmx0hxq/Vulnerability-learning/blob/main/shopxo-rce.md",
          "name" : "https://github.com/jmx0hxq/Vulnerability-learning/blob/main/shopxo-rce.md",
          "refsource" : "",
          "tags" : [ "Broken Link", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296601",
          "name" : "VDB-296601 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296601",
          "name" : "VDB-296601 | ShopXO Template ThemeAdminService.php injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.501211",
          "name" : "Submit #501211 | ShopXO ShopXO enterprise-level e-commerce system <=6.4.0 Template injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ShopXO up to 6.4.0. It has been classified as problematic. This affects an unknown part of the file app/service/ThemeAdminService.php of the component Template Handler. The manipulation leads to injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:shopxo:shopxo:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "6.4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-24T02:15Z",
    "lastModifiedDate" : "2025-07-02T17:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1612",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296602",
          "name" : "VDB-296602 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296602",
          "name" : "VDB-296602 | Edimax BR-6288ACL wireless5g_basic.asp cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.501309",
          "name" : "Submit #501309 | Edimax Wireless Router BR-6288ACL 1.30 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Edimax BR-6288ACL 1.30. It has been declared as problematic. This vulnerability affects unknown code of the file wireless5g_basic.asp. The manipulation of the argument SSID leads to cross site scripting. The attack can be initiated remotely. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:edimax:br-6288acl_firmware:1.30:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:edimax:br-6288acl:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-24T03:15Z",
    "lastModifiedDate" : "2025-05-21T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1613",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296603",
          "name" : "VDB-296603 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296603",
          "name" : "VDB-296603 | FiberHome AN5506-01A ONU GPON URL Filtering Submenu URL_filterCfg cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.501349",
          "name" : "Submit #501349 | FiberHome AN5506-01A ONU GPON RP2511 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in FiberHome AN5506-01A ONU GPON RP2511. It has been rated as problematic. This issue affects some unknown processing of the file /goform/URL_filterCfg of the component URL Filtering Submenu. The manipulation of the argument url_IP leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:fiberhome:an5506-01-a_firmware:rp2511:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:fiberhome:an5506-01-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-24T03:15Z",
    "lastModifiedDate" : "2025-02-28T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1614",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296604",
          "name" : "VDB-296604 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296604",
          "name" : "VDB-296604 | FiberHome AN5506-01A ONU GPON Port Forwarding Submenu portForwardingCfg cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.501365",
          "name" : "Submit #501365 | FiberHome AN5506-01A ONU GPON RP2511 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected is an unknown function of the file /goform/portForwardingCfg of the component Port Forwarding Submenu. The manipulation of the argument pf_Description leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:fiberhome:an5506-01-a_firmware:rp2511:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:fiberhome:an5506-01-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-24T03:15Z",
    "lastModifiedDate" : "2025-02-28T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1615",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296605",
          "name" : "VDB-296605 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296605",
          "name" : "VDB-296605 | FiberHome AN5506-01A ONU GPON NAT Submenu cross site scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.501408",
          "name" : "Submit #501408 | FiberHome AN5506-01A ONU GPON RP2511  Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in FiberHome AN5506-01A ONU GPON RP2511. Affected by this vulnerability is an unknown functionality of the component NAT Submenu. The manipulation of the argument Description leads to cross site scripting. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:fiberhome:an5506-01-a_firmware:rp2511:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:fiberhome:an5506-01-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-24T04:15Z",
    "lastModifiedDate" : "2025-02-28T18:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1616",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296606",
          "name" : "VDB-296606 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296606",
          "name" : "VDB-296606 | FiberHome AN5506-01A ONU GPON Diagnosis os command injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.501483",
          "name" : "Submit #501483 | FiberHome AN5506-01-A RP2511 Command Injection",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in FiberHome AN5506-01A ONU GPON RP2511. Affected by this issue is some unknown functionality of the component Diagnosis. The manipulation of the argument Destination Address leads to os command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:fiberhome:an5506-01a_firmware:rp2511:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:fiberhome:an5506-01a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-24T04:15Z",
    "lastModifiedDate" : "2025-02-28T16:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1617",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296607",
          "name" : "VDB-296607 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296607",
          "name" : "VDB-296607 | Netis WF2780 Wireless 2.4G Menu cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501472",
          "name" : "Submit #501472 | Netis WF2780 V2.1.41925 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Netis WF2780 2.1.41925. This affects an unknown part of the component Wireless 2.4G Menu. The manipulation of the argument SSID leads to cross site scripting. It is possible to initiate the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.4,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-24T04:15Z",
    "lastModifiedDate" : "2025-02-24T04:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1618",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296608",
          "name" : "VDB-296608 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296608",
          "name" : "VDB-296608 | vTiger CRM index.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501840",
          "name" : "Submit #501840 | vtiger Vtiger CRM 6.4.0 Reflected Cross-Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.vtiger.com/",
          "name" : "https://www.vtiger.com/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in vTiger CRM 6.4.0/6.5.0 and classified as problematic. This vulnerability affects unknown code of the file /modules/Mobile/index.php. The manipulation of the argument _operation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.0 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-24T05:15Z",
    "lastModifiedDate" : "2025-03-03T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1619",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/ae9bc19d-1634-4501-a258-8c56b2afee88/",
          "name" : "https://wpscan.com/vulnerability/ae9bc19d-1634-4501-a258-8c56b2afee88/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mooveagency:gdpr_cookie_compliance:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.15.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-16T06:15Z",
    "lastModifiedDate" : "2025-04-02T12:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1620",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/923db805-92e7-4489-8e57-374a19f817d7/",
          "name" : "https://wpscan.com/vulnerability/923db805-92e7-4489-8e57-374a19f817d7/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mooveagency:gdpr_cookie_compliance:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.15.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-16T06:15Z",
    "lastModifiedDate" : "2025-04-02T12:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1621",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/c30b9631-2024-4081-9cc5-8294a77c5ebb/",
          "name" : "https://wpscan.com/vulnerability/c30b9631-2024-4081-9cc5-8294a77c5ebb/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mooveagency:gdpr_cookie_compliance:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.15.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-16T06:15Z",
    "lastModifiedDate" : "2025-04-02T12:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1622",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/7a903d61-2792-4fe0-a26b-f400f4a3124b/",
          "name" : "https://wpscan.com/vulnerability/7a903d61-2792-4fe0-a26b-f400f4a3124b/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GDPR Cookie Compliance  WordPress plugin before 4.15.7 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mooveagency:gdpr_cookie_compliance:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.15.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-16T06:15Z",
    "lastModifiedDate" : "2025-04-02T12:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1623",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/40288fa0-50c6-4e13-9b92-968b060d3bf5/",
          "name" : "https://wpscan.com/vulnerability/40288fa0-50c6-4e13-9b92-968b060d3bf5/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GDPR Cookie Compliance  WordPress plugin before 4.15.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mooveagency:gdpr_cookie_compliance:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.15.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-16T06:15Z",
    "lastModifiedDate" : "2025-04-02T12:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1624",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/2f4a402a-97f6-4638-9ce0-456ccd5606e9/",
          "name" : "https://wpscan.com/vulnerability/2f4a402a-97f6-4638-9ce0-456ccd5606e9/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The GDPR Cookie Compliance  WordPress plugin before 4.15.9 does not sanitise and escape some of its settings, which could allow high privilege users such as admin to perform Stored Cross-Site Scripting attacks even when the unfiltered_html capability is disallowed (for example in multisite setup)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mooveagency:gdpr_cookie_compliance:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.15.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-16T06:15Z",
    "lastModifiedDate" : "2025-04-02T12:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1625",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/288208c4-e9ca-4b79-88e7-fb415a726fce/",
          "name" : "https://wpscan.com/vulnerability/288208c4-e9ca-4b79-88e7-fb415a726fce/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Qi Blocks WordPress plugin before 1.4 does not validate and escape some of its Counter block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:qodeinteractive:qi_blocks:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-19T06:15Z",
    "lastModifiedDate" : "2025-06-17T20:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1626",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/f00d86f1-7ff9-4001-af16-989358d811a8/",
          "name" : "https://wpscan.com/vulnerability/f00d86f1-7ff9-4001-af16-989358d811a8/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Qi Blocks WordPress plugin before 1.4 does not validate and escape some of its Countdown block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:qodeinteractive:qi_blocks:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-19T06:15Z",
    "lastModifiedDate" : "2025-06-17T20:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1627",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/31b2292b-1ea7-4d63-ad65-0366e2c05dd3/",
          "name" : "https://wpscan.com/vulnerability/31b2292b-1ea7-4d63-ad65-0366e2c05dd3/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Qi Blocks WordPress plugin before 1.4 does not validate and escape some of its block options before outputting them back in a page/post where the block is embed, which could allow users with the contributor role and above to perform Stored Cross-Site Scripting attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:qodeinteractive:qi_blocks:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-19T06:15Z",
    "lastModifiedDate" : "2025-06-17T20:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1628",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-19T23:15Z",
    "lastModifiedDate" : "2025-03-19T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1629",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-307"
          }, {
            "lang" : "en",
            "value" : "CWE-799"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.296610",
          "name" : "VDB-296610 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296610",
          "name" : "VDB-296610 | Excitel Broadband Private my Excitel App One-Time Password excessive authentication",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501868",
          "name" : "Submit #501868 | Excitel Broadband Private Ltd. myExcitel Android app 3.13.0 Insecure OTP Verification",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Excitel Broadband Private my Excitel App 3.13.0 on Android. It has been classified as problematic. Affected is an unknown function of the component One-Time Password Handler. The manipulation leads to improper restriction of excessive authentication attempts. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-24T05:15Z",
    "lastModifiedDate" : "2025-02-24T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1631",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1632",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc",
          "name" : "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc",
          "name" : "https://github.com/Ekkosun/pocs/blob/main/bsdunzip-poc",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296619",
          "name" : "VDB-296619 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296619",
          "name" : "VDB-296619 | libarchive bsdunzip.c list null pointer dereference",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.496460",
          "name" : "Submit #496460 | libarchive bsdunzip 3.77 NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:libarchive:libarchive:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "3.7.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-24T14:15Z",
    "lastModifiedDate" : "2025-03-25T15:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1634",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:12511",
          "name" : "RHSA-2025:12511",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1884",
          "name" : "RHSA-2025:1884",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1885",
          "name" : "RHSA-2025:1885",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:2067",
          "name" : "RHSA-2025:2067",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/errata/RHSA-2025:9922",
          "name" : "RHSA-2025:9922",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1634",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1634",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2347319",
          "name" : "RHBZ#2347319",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the quarkus-resteasy extension, which causes memory leaks when client requests with low timeouts are made. If a client request times out, a buffer is not released correctly, leading to increased memory usage and eventual application crash due to OutOfMemoryError."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-08-01T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1635",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0004/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0004/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information in hub data source export feature in Devolutions Remote Desktop Manager 2024.3.29 and earlier on Windows allows a user exporting a hub data source to include his authenticated session in the export due to faulty business logic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
          "versionEndExcluding" : "2024.3.31.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
          "versionEndExcluding" : "2024.3.31.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T13:15Z",
    "lastModifiedDate" : "2025-03-28T16:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1636",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0004/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0004/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information in My Personal Credentials password history component in Devolutions Remote Desktop Manager 2024.3.29 and earlier on Windows allows an authenticated user to inadvertently leak the My Personal Credentials in a shared vault via the clear history feature due to faulty business logic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:free:windows:*:*",
          "versionEndExcluding" : "2024.3.31.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:remote_desktop_manager:*:*:*:*:team:windows:*:*",
          "versionEndExcluding" : "2024.3.31.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T13:15Z",
    "lastModifiedDate" : "2025-03-28T16:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1638",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/alloggio-hotel-booking-theme/26775539",
          "name" : "https://themeforest.net/item/alloggio-hotel-booking-theme/26775539",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/60405e54-e869-4623-892c-0821014f887b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/60405e54-e869-4623-892c-0821014f887b?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Alloggio Membership plugin for WordPress is vulnerable to Authentication Bypass in all versions up to, and including, 1.0.2. This is due to the plugin not properly validating a user's identity through the alloggio_membership_init_rest_api_facebook_login and alloggio_membership_init_rest_api_google_login functions. This makes it possible for unauthenticated attackers to log in as any user, including administrators, without knowing a password."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-01T08:15Z",
    "lastModifiedDate" : "2025-03-01T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1639",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/arolax-creative-digital-agency-theme/53547630",
          "name" : "https://themeforest.net/item/arolax-creative-digital-agency-theme/53547630",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb310bdb-fc74-47b2-9371-3d10abd287fb?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb310bdb-fc74-47b2-9371-3d10abd287fb?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Animation Addons for Elementor Pro plugin for WordPress is vulnerable to unauthorized arbitrary plugin installation due to a missing capability check on the install_elementor_plugin_handler() function in all versions up to, and including, 1.6. This makes it possible for authenticated attackers, with Subscriber-level access and above, to install and activate arbitrary plugins which can be leveraged to further infect a victim when Elementor is not activated on a vulnerable site."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:crowdytheme:arolax:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1640",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/CVES",
          "name" : "https://github.com/yago3008/CVES",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296690",
          "name" : "VDB-296690 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296690",
          "name" : "VDB-296690 | Benner ModernaNet JS_CarregaCombo sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.499115",
          "name" : "Submit #499115 | benner modernanet < 1.1.1 Blind Boolean-Based SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Benner ModernaNet up to 1.1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /Home/JS_CarregaCombo?formName=DADOS_PESSOAIS_PLANO&additionalCondition=&insideParameters=&elementToReturn=DADOS_PESSOAIS_PLANO&ordenarPelaDescricao=true&direcaoOrdenacao=asc&_=1739290047295. The manipulation leads to sql injection. The attack may be launched remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:modernasistemas:modernanet:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-25T00:15Z",
    "lastModifiedDate" : "2025-02-28T01:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1641",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296691",
          "name" : "VDB-296691 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296691",
          "name" : "VDB-296691 | Benner ModernaNet GetHorariosDoDia sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.499875",
          "name" : "Submit #499875 | benner modernanet < 1.1.1 sqli",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been classified as critical. This affects an unknown part of the file /AGE0000700/GetHorariosDoDia?idespec=0&idproced=1103&data=2025-02-25+19%3A25&agserv=0&convenio=1&localatend=1&idplano=5&pesfis=01&idprofissional=0&target=.horarios--dia--d0&_=1739371223797. The manipulation leads to sql injection. It is possible to initiate the attack remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:modernasistemas:modernanet:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-25T00:15Z",
    "lastModifiedDate" : "2025-02-28T01:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1642",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-99"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296692",
          "name" : "VDB-296692 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296692",
          "name" : "VDB-296692 | Benner ModernaNet GetImageMedico resource injection",
          "refsource" : "",
          "tags" : [ "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.499877",
          "name" : "Submit #499877 | benner modernanet < 1.1.1 IDOR - Insecure Direct Object Reference",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been declared as critical. This vulnerability affects unknown code of the file /AGE0000700/GetImageMedico?fooId=1. The manipulation of the argument fooId leads to improper control of resource identifiers. The attack can be initiated remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:modernasistemas:modernanet:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-25T01:15Z",
    "lastModifiedDate" : "2025-02-28T01:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1643",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296693",
          "name" : "VDB-296693 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296693",
          "name" : "VDB-296693 | Benner ModernaNet SG_AlterarSenha cross-site request forgery",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.500574",
          "name" : "Submit #500574 | benner modernanet < 1.1.1 Cross-Site Request Forgery leads to Account Take Over",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Benner ModernaNet up to 1.1.0. It has been rated as problematic. This issue affects some unknown processing of the file /DadosPessoais/SG_AlterarSenha. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. Upgrading to version 1.1.1 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:modernasistemas:modernanet:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.1.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-25T01:15Z",
    "lastModifiedDate" : "2025-02-28T01:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1644",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296694",
          "name" : "VDB-296694 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.296694",
          "name" : "VDB-296694 | Benner ModernaNet SG_Gravar cross-site request forgery",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.500575",
          "name" : "Submit #500575 | benner modernanet < 1.2.1 Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ "VDB Entry", "Third Party Advisory", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in Benner ModernaNet up to 1.2.0. Affected is an unknown function of the file /DadosPessoais/SG_Gravar. The manipulation of the argument idItAg leads to cross-site request forgery. It is possible to launch the attack remotely. Upgrading to version 1.2.1 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:modernasistemas:modernanet:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "1.2.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-25T02:15Z",
    "lastModifiedDate" : "2025-02-28T01:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1645",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-99"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296695",
          "name" : "VDB-296695 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296695",
          "name" : "VDB-296695 | Benner Connecta EditarLogado resource injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.501406",
          "name" : "Submit #501406 | benner Benner Conecta 1.0.5330 Insecure Direct Object Reference leads to Account Take Over",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Benner Connecta 1.0.5330. Affected by this vulnerability is an unknown functionality of the file /Usuarios/Usuario/EditarLogado/. The manipulation of the argument Handle leads to improper control of resource identifiers. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-25T02:15Z",
    "lastModifiedDate" : "2025-02-25T02:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1646",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/Lserp/fileUpload_3.md",
          "name" : "https://github.com/Rain1er/report/blob/main/Lserp/fileUpload_3.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/Lserp/fileUpload_3.md",
          "name" : "https://github.com/Rain1er/report/blob/main/Lserp/fileUpload_3.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296696",
          "name" : "VDB-296696 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296696",
          "name" : "VDB-296696 | Lumsoft ERP ASPX File UploadAjaxAPI.ashx unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.500501",
          "name" : "Submit #500501 | lserp ERP v8 RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Lumsoft ERP 8. Affected by this issue is some unknown functionality of the file /Api/TinyMce/UploadAjaxAPI.ashx of the component ASPX File Handler. The manipulation of the argument file leads to unrestricted upload. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-25T03:15Z",
    "lastModifiedDate" : "2025-02-25T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1647",
        "ASSIGNER" : "disclosures@herodevs.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/06/msg00001.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/06/msg00001.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.herodevs.com/vulnerability-directory/cve-2025-1647",
          "name" : "https://www.herodevs.com/vulnerability-directory/cve-2025-1647",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Input During Web Page Generation (XSS or 'Cross-site Scripting') vulnerability in Bootstrap allows Cross-Site Scripting (XSS).This issue affects Bootstrap: from 3.4.1 before 4.0.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-15T17:15Z",
    "lastModifiedDate" : "2025-06-01T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1648",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://atviksecurity.com/yawave-wordpress-plugin-unauthenticated-sql-injection/",
          "name" : "https://atviksecurity.com/yawave-wordpress-plugin-unauthenticated-sql-injection/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/yawave/trunk/includes/shortcode.liveblog.php#L69",
          "name" : "https://plugins.trac.wordpress.org/browser/yawave/trunk/includes/shortcode.liveblog.php#L69",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5cc21a-eb3a-429a-a0f9-0181d95a9eeb?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6a5cc21a-eb3a-429a-a0f9-0181d95a9eeb?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Yawave plugin for WordPress is vulnerable to SQL Injection via the 'lbid' parameter in all versions up to, and including, 2.9.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:yawave:yawave:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.9.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-25T07:15Z",
    "lastModifiedDate" : "2025-02-28T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1649",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1650",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-908"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted CATPRODUCT file, when parsed through Autodesk AutoCAD, can force an Uninitialized Variable vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1651",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1652",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "name" : "https://www.autodesk.com/support/technical/article/caas/sfdcarticles/sfdcarticles/Where-can-I-download-the-latest-update-of-AutoCAD-AutoCAD-LT-2022.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0001",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted MODEL file, when parsed through Autodesk AutoCAD, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:advance_steel:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:civil_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mechanical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_mep:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_plant_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_map_3d:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_architecture:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.1.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.1.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:autocad_electrical:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2022",
          "versionEndExcluding" : "2022.1.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1653",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/ulisting/",
          "name" : "https://wordpress.org/plugins/ulisting/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4181b26e-89c7-4020-a3d4-29bdc88d7438?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4181b26e-89c7-4020-a3d4-29bdc88d7438?source=cve",
          "refsource" : "",
          "tags" : [ "Mitigation", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 2.1.7. This is due to the stm_listing_profile_edit AJAX action not having enough restriction on the user meta that can be updated. This makes it possible for authenticated attackers, with Subscriber-level access and above, to elevate their privileges to that of an administrator."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-15T03:15Z",
    "lastModifiedDate" : "2025-03-28T13:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1656",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0003",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted PDF file, when linked or imported into Autodesk applications, can force a Heap-Based Overflow vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2024",
          "versionEndExcluding" : "2024.3.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.4.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:revit:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2023",
          "versionEndExcluding" : "2023.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-15T21:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1657",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/ulisting/",
          "name" : "https://wordpress.org/plugins/ulisting/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e70184f-94b6-4742-b99b-6eec9d28f17c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/0e70184f-94b6-4742-b99b-6eec9d28f17c?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Directory Listings WordPress plugin – uListing plugin for WordPress is vulnerable to unauthorized modification of data and PHP Object Injection due to a missing capability check on the stm_listing_ajax AJAX action in all versions up to, and including, 2.1.7. This makes it possible for authenticated attackers, with subscriber-level access and above, to update post meta data and inject PHP Objects that may be unserialized."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:stylemixthemes:ulisting:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-15T03:15Z",
    "lastModifiedDate" : "2025-03-28T12:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1658",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-01T13:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1659",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force an Out-of-Bounds Read vulnerability. A malicious actor can leverage this vulnerability to cause a crash, read sensitive data, or execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-01T13:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1660",
        "ASSIGNER" : "psirt@autodesk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.autodesk.com/products/autodesk-access/overview",
          "name" : "https://www.autodesk.com/products/autodesk-access/overview",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
          "name" : "https://www.autodesk.com/trust/security-advisories/adsk-sa-2025-0002",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted DWFX file, when parsed through Autodesk Navisworks, can force a Memory Corruption vulnerability. A malicious actor can leverage this vulnerability to execute arbitrary code in the context of the current process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:autodesk:navisworks:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "2025",
          "versionEndExcluding" : "2025.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-01T13:15Z",
    "lastModifiedDate" : "2025-08-19T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1661",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_text/index.php",
          "name" : "https://plugins.trac.wordpress.org/browser/woocommerce-products-filter/trunk/ext/by_text/index.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249621%40woocommerce-products-filter&new=3249621%40woocommerce-products-filter&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3249621%40woocommerce-products-filter&new=3249621%40woocommerce-products-filter&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253169%40woocommerce-products-filter&new=3253169%40woocommerce-products-filter&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3253169%40woocommerce-products-filter&new=3253169%40woocommerce-products-filter&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae7b6fc-2120-4573-8b1b-d5422d435fa5?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ae7b6fc-2120-4573-8b1b-d5422d435fa5?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The HUSKY – Products Filter Professional for WooCommerce plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 1.3.6.5 via the 'template' parameter of the woof_text_search AJAX action. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pluginus:husky_-_products_filter_professional_for_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.3.6.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-11T04:15Z",
    "lastModifiedDate" : "2025-03-19T20:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1662",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          }, {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/plugins/url-media-uploader/",
          "name" : "https://wordpress.org/plugins/url-media-uploader/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8f1852-2d67-4ed9-ab3d-5b3bf4083e06?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/ae8f1852-2d67-4ed9-ab3d-5b3bf4083e06?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The URL Media Uploader plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 1.0.0 via the 'url_media_uploader_url_upload' action. This makes it possible for authenticated attackers, with author-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:apprhyme:url_media_uploader:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.0.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T09:15Z",
    "lastModifiedDate" : "2025-03-06T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1663",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3258648%40unlimited-elements-for-elementor&new=3258648%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3258648%40unlimited-elements-for-elementor&new=3258648%40unlimited-elements-for-elementor&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d07c43e0-783a-499b-b172-d058583d0749?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d07c43e0-783a-499b-b172-d058583d0749?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Unlimited Elements For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several widgets in all versions up to, and including, 1.5.142 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:unlimited-elements:unlimited_elements_for_elementor:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.5.142",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-03T08:15Z",
    "lastModifiedDate" : "2025-04-10T14:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1664",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250957/essential-blocks/tags/5.3.2/assets/blocks/parallax-slider/frontend.js",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250957/essential-blocks/tags/5.3.2/assets/blocks/parallax-slider/frontend.js",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6abfa01b-e2ec-412c-a17d-e8bd1f5ac228?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6abfa01b-e2ec-412c-a17d-e8bd1f5ac228?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Essential Blocks – Page Builder Gutenberg Blocks, Patterns & Templates plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Parallax slider in all versions up to, and including, 5.3.1 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:wpdeveloper:essential_blocks:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "5.3.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-08T12:15Z",
    "lastModifiedDate" : "2025-03-11T21:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1665",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://avada.com",
          "name" : "https://avada.com",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/94e373fb-b3f5-4c1b-9eaa-89747af4dc30?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/94e373fb-b3f5-4c1b-9eaa-89747af4dc30?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Avada (Fusion) Builder plugin for WordPress is vulnerable to Stored Cross-Site Scripting via several of the plugin's shortcodes in all versions up to, and including, 3.11.14 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:theme-fusion:avada_builder:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "3.11.14",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-01T06:15Z",
    "lastModifiedDate" : "2025-04-14T19:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1666",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/cookiebot/tags/4.4.1/src/lib/Cookiebot_Review.php#L135",
          "name" : "https://plugins.trac.wordpress.org/browser/cookiebot/tags/4.4.1/src/lib/Cookiebot_Review.php#L135",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3251089%40cookiebot&new=3251089%40cookiebot&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3251089%40cookiebot&new=3251089%40cookiebot&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e5fca6-363c-4875-9eb8-44e080d99650?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d2e5fca6-363c-4875-9eb8-44e080d99650?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Cookie banner plugin for WordPress – Cookiebot CMP by Usercentrics plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the send_uninstall_survey() function in all versions up to, and including, 4.4.1. This makes it possible for authenticated attackers, with Subscriber-level access and above, to submit the uninstall survey on behalf of a website."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-06T12:15Z",
    "lastModifiedDate" : "2025-03-06T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1667",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/lib/wpsp-ajaxworks-teacher.php#L544",
          "name" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/lib/wpsp-ajaxworks-teacher.php#L544",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e54f98bc-c538-4f3c-b24a-6e778a3748ef?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/e54f98bc-c538-4f3c-b24a-6e778a3748ef?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The School Management System – WPSchoolPress plugin for WordPress is vulnerable to Privilege Escalation due to a missing capability check on the wpsp_UpdateTeacher() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to update arbitrary user details including email which makes it possible to request a password reset and access arbitrary user accounts, including administrators."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:igexsolutions:wpschoolpress:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.2.16",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-15T04:15Z",
    "lastModifiedDate" : "2025-03-28T12:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1668",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/lib/wpsp-ajaxworks.php#L22",
          "name" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/lib/wpsp-ajaxworks.php#L22",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd5638b6-134d-4386-af40-6ac961a915d7?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fd5638b6-134d-4386-af40-6ac961a915d7?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The School Management System – WPSchoolPress plugin for WordPress is vulnerable to arbitrary user deletion due to a missing capability check on the wpsp_DeleteUser() function in all versions up to, and including, 2.2.16. This makes it possible for authenticated attackers, with teacher-level access and above, to delete arbitrary user accounts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:igexsolutions:wpschoolpress:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.2.16",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-15T04:15Z",
    "lastModifiedDate" : "2025-03-28T20:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1669",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/lib/wpsp-ajaxworks.php#L4304",
          "name" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/lib/wpsp-ajaxworks.php#L4304",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b7413d90-aed1-4f78-a17c-bed76efb48f8?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b7413d90-aed1-4f78-a17c-bed76efb48f8?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'addNotify' action in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with teacher-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:igexsolutions:wpschoolpress:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.2.16",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-15T04:15Z",
    "lastModifiedDate" : "2025-03-28T19:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1670",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/pages/wpsp-exams.php#L186",
          "name" : "https://plugins.trac.wordpress.org/browser/wpschoolpress/tags/2.2.16/pages/wpsp-exams.php#L186",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f38c28f4-e73a-4eb2-8bbd-73c849385c4e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f38c28f4-e73a-4eb2-8bbd-73c849385c4e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The School Management System – WPSchoolPress plugin for WordPress is vulnerable to SQL Injection via the 'cid' parameter in all versions up to, and including, 2.2.16 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Custom-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:igexsolutions:wpschoolpress:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "2.2.16",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-15T04:15Z",
    "lastModifiedDate" : "2025-03-28T19:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1671",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/academist-a-modern-learning-management-system-and-education-theme/22376830",
          "name" : "https://themeforest.net/item/academist-a-modern-learning-management-system-and-education-theme/22376830",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/911a9550-1f62-4f28-9d8c-00d9769949c9?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/911a9550-1f62-4f28-9d8c-00d9769949c9?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Academist Membership plugin for WordPress is vulnerable to Privilege Escalation in all versions up to, and including, 1.1.6. This is due to the academist_membership_check_facebook_user() function not properly verifying a user's identity prior to authenticating them. This makes it possible for unauthenticated attackers to log in as any user, including site administrators."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-01T08:15Z",
    "lastModifiedDate" : "2025-03-01T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1672",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3246799/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3246799/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/notibar/#developers",
          "name" : "https://wordpress.org/plugins/notibar/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9985627d-9ba4-4a5b-94fb-06bcc769acfd?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9985627d-9ba4-4a5b-94fb-06bcc769acfd?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Notibar – Notification Bar for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 2.1.5 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with administrator-level permissions and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. This only affects multi-site installations and installations where unfiltered_html has been disabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-06T10:15Z",
    "lastModifiedDate" : "2025-03-06T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1673",
        "ASSIGNER" : "vulnerabilities@zephyrproject.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jjhx-rrh4-j8mx",
          "name" : "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-jjhx-rrh4-j8mx",
          "refsource" : "",
          "tags" : [ "Mitigation", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A malicious or malformed DNS packet without a payload can cause an out-of-bounds read, resulting in a crash (denial of service) or an incorrect computation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-02-25T07:15Z",
    "lastModifiedDate" : "2025-02-28T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1674",
        "ASSIGNER" : "vulnerabilities@zephyrproject.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-x975-8pgf-qh66",
          "name" : "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-x975-8pgf-qh66",
          "refsource" : "",
          "tags" : [ "Mitigation", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A lack of input validation allows for out of bounds reads caused by malicious or malformed packets."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "4.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-02-25T08:15Z",
    "lastModifiedDate" : "2025-02-28T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1675",
        "ASSIGNER" : "vulnerabilities@zephyrproject.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2m84-5hfw-m8v4",
          "name" : "https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-2m84-5hfw-m8v4",
          "refsource" : "",
          "tags" : [ "Patch", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The function dns_copy_qname in dns_pack.c performs performs a memcpy operation with an untrusted field and does not check if the source buffer is large enough to contain the copied data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:zephyrproject:zephyr:*:-:*:*:*:*:*:*",
          "versionEndIncluding" : "4.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-25T08:15Z",
    "lastModifiedDate" : "2025-02-28T01:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1676",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/nxb/rce1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/nxb/rce1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/nxb/rce1.md",
          "name" : "https://github.com/Rain1er/report/blob/main/nxb/rce1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.296731",
          "name" : "VDB-296731 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.296731",
          "name" : "VDB-296731 | hzmanyun Education and Training System pdf2swf os command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.500507",
          "name" : "Submit #500507 | hzmanyun education and training system v3.1.1 RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in hzmanyun Education and Training System 3.1.1. Affected by this vulnerability is the function pdf2swf of the file /pdf2swf. The manipulation of the argument file leads to os command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-25T11:15Z",
    "lastModifiedDate" : "2025-02-25T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1677",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/521117",
          "name" : "GitLab Issue #521117",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3004008",
          "name" : "HackerOne Bug Bounty Report #3004008",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) issue has been discovered in GitLab CE/EE affecting all up to 17.8.7, 17.9 prior to 17.9.6 and 17.10 prior to 17.10.4 A denial of service could occur upon injecting oversized payloads into CI pipeline exports."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.9.0",
          "versionEndExcluding" : "17.9.6",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionEndIncluding" : "17.8.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionEndIncluding" : "17.8.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-10T13:15Z",
    "lastModifiedDate" : "2025-08-07T18:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1681",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "name" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://webtemplatemasters.com/cardealer/changelog/#v165",
          "name" : "https://webtemplatemasters.com/cardealer/changelog/#v165",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e394ee2-13c1-4b04-a8a5-4642f1794d59?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3e394ee2-13c1-4b04-a8a5-4642f1794d59?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Cardealer theme for WordPress is vulnerable to unauthorized modification of data and loss of data due to a missing capability check and missing filename sanitization on the demo theme scheme AJAX functions in versions up to, and including, 1.6.4. This makes it possible for authenticated attackers, with subscriber-level access and above, to change or delete arbitrary css and js files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-02-28T00:15Z",
    "lastModifiedDate" : "2025-02-28T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1682",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "name" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://webtemplatemasters.com/cardealer/changelog/#v165",
          "name" : "https://webtemplatemasters.com/cardealer/changelog/#v165",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e337281-f05e-486c-9491-161365af252a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4e337281-f05e-486c-9491-161365af252a?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Cardealer theme for WordPress is vulnerable to privilege escalation in versions up to, and including, 1.6.4 due to missing capability check on the 'save_settings' function. This makes it possible for authenticated attackers, with subscriber-level access and above, to modify the default user role."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T00:15Z",
    "lastModifiedDate" : "2025-02-28T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1683",
        "ASSIGNER" : "security@1e.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://capec.mitre.org/data/definitions/27.html",
          "name" : "https://capec.mitre.org/data/definitions/27.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cwe.mitre.org/data/definitions/59.html",
          "name" : "https://cwe.mitre.org/data/definitions/59.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nvd.nist.gov/vuln/detail/CVE-2025-1683",
          "name" : "https://nvd.nist.gov/vuln/detail/CVE-2025-1683",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2025-2001/",
          "name" : "https://www.teamviewer.com/en/resources/trust-center/security-bulletins/1e-2025-2001/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper link resolution before file access in the Nomad module of the 1E Client, in versions prior to 25.3, enables an attacker with local unprivileged access on a Windows system to delete arbitrary files on the device by exploiting symbolic links."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-05-15T15:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1686",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/PebbleTemplates/pebble/issues/680",
          "name" : "https://github.com/PebbleTemplates/pebble/issues/680",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://github.com/PebbleTemplates/pebble/issues/688",
          "name" : "https://github.com/PebbleTemplates/pebble/issues/688",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://pebbletemplates.io/wiki/tag/include",
          "name" : "https://pebbletemplates.io/wiki/tag/include",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594",
          "name" : "https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594",
          "name" : "https://security.snyk.io/vuln/SNYK-JAVA-IOPEBBLETEMPLATES-8745594",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "All versions of the package io.pebbletemplates:pebble are vulnerable to External Control of File Name or Path via the include tag. A high privileged attacker can access sensitive local files by crafting malicious notification templates that leverage this tag to include files like /etc/passwd or /proc/1/environ.\r\r Workaround\r\rThis vulnerability can be mitigated by disabling the include macro in Pebble Templates:\r\rjava\rnew PebbleEngine.Builder()\r            .registerExtensionCustomizer(new DisallowExtensionCustomizerBuilder()\r                    .disallowedTokenParserTags(List.of(\"include\"))\r                    .build())\r            .build();"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pebbletemplates:pebble:*:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-27T05:15Z",
    "lastModifiedDate" : "2025-04-07T18:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1687",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "name" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://webtemplatemasters.com/cardealer/changelog/#v165",
          "name" : "https://webtemplatemasters.com/cardealer/changelog/#v165",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6305b7be-8651-4028-a8cf-ea58b4977225?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6305b7be-8651-4028-a8cf-ea58b4977225?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Cardealer theme for WordPress is vulnerable to Cross-Site Request Forgery in versions up to, and including, 1.6.4. This is due to missing nonce validation on the 'update_user_profile' function. This makes it possible for unauthenticated attackers to update the user email and password via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T00:15Z",
    "lastModifiedDate" : "2025-02-28T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1688",
        "ASSIGNER" : "psirt@milestonesys.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://supportcommunity.milestonesys.com/KBRedir?art=000069835&lang=en_US",
          "name" : "https://supportcommunity.milestonesys.com/KBRedir?art=000069835&lang=en_US",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Milestone Systems has discovered a\nsecurity vulnerability in Milestone XProtect installer that resets system\nconfiguration password after the upgrading from older versions using specific\ninstallers.\n\n\n\nThe system configuration\npassword is an additional, optional protection that is enabled on the\nManagement Server.\n\n\nTo mitigate the issue, we highly recommend updating system configuration password via GUI with a standard procedure.\n\n\n\nAny system upgraded with\n2024 R1 or 2024 R2 release installer is vulnerable to this issue.\n\n\n\nSystems upgraded from 2023\nR3 or older with version 2025 R1 and newer are not affected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-15T11:15Z",
    "lastModifiedDate" : "2025-04-15T18:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1689",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ThemeMakers/tmm_paypal_checkout/commit/d6d3b1877ed705ac171cf7e74a6e866fc135ba22",
          "name" : "https://github.com/ThemeMakers/tmm_paypal_checkout/commit/d6d3b1877ed705ac171cf7e74a6e866fc135ba22",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "name" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6390dba6-423b-48be-b5f0-1018d94f4a32?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/6390dba6-423b-48be-b5f0-1018d94f4a32?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ThemeMakers PayPal Express Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'paypal' shortcode in versions up to, and including, 1.1.9 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:thememakers:paypal_checkout:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.2.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-27T07:15Z",
    "lastModifiedDate" : "2025-03-11T16:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1690",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ThemeMakers/tmm_stripe_checkout/compare/v1.0.1...v1.0.2",
          "name" : "https://github.com/ThemeMakers/tmm_stripe_checkout/compare/v1.0.1...v1.0.2",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "name" : "https://themeforest.net/item/car-dealer-automotive-wordpress-theme-responsive/8574708",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd040ff7-7f30-4097-9492-743a9821589e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dd040ff7-7f30-4097-9492-743a9821589e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The ThemeMakers Stripe Checkout plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the 'stripe' shortcode in versions up to, and including, 1.0.1 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers with contributor-level and above permissions to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:thememakers:stripe_checkout:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-27T09:15Z",
    "lastModifiedDate" : "2025-03-11T15:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1691",
        "ASSIGNER" : "cna@mongodb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jira.mongodb.org/browse/MONGOSH-2024",
          "name" : "https://jira.mongodb.org/browse/MONGOSH-2024",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The MongoDB Shell may be susceptible to control character injection where an attacker with control of the mongosh autocomplete feature, can use the autocompletion feature to input and run obfuscated malicious text. This requires user interaction in the form of the user using ‘tab’ to autocomplete text that is a prefix of the attacker’s prepared autocompletion. This issue affects mongosh versions prior to 2.3.9. \n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T13:15Z",
    "lastModifiedDate" : "2025-02-27T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1692",
        "ASSIGNER" : "cna@mongodb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jira.mongodb.org/browse/MONGOSH-2025",
          "name" : "https://jira.mongodb.org/browse/MONGOSH-2025",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The MongoDB Shell may be susceptible to control character injection where an attacker with control of the user’s clipboard could manipulate them to paste text into mongosh that evaluates arbitrary code. Control characters in the pasted text can be used to obfuscate malicious code. This issue affects mongosh versions prior to 2.3.9"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T13:15Z",
    "lastModifiedDate" : "2025-02-27T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1693",
        "ASSIGNER" : "cna@mongodb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jira.mongodb.org/browse/MONGOSH-2026",
          "name" : "https://jira.mongodb.org/browse/MONGOSH-2026",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The MongoDB Shell may be susceptible to control character injection where an attacker with control over the database cluster contents can inject control characters into the shell output. This may result in the display of falsified messages that appear to originate from mongosh or the underlying operating system, potentially misleading users into executing unsafe actions.\n\n\nThe vulnerability is exploitable only when mongosh is connected to a cluster that is partially or fully controlled by an attacker.\n\n\nThis issue affects mongosh versions prior to 2.3.9"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T13:15Z",
    "lastModifiedDate" : "2025-02-27T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1695",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000149959",
          "name" : "https://my.f5.com/manage/s/article/K000149959",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In NGINX Unit before version 1.34.2 with the Java Language Module in use, undisclosed requests can lead to an infinite loop and cause an increase in CPU resource utilization.  This vulnerability allows a remote attacker to cause a degradation that can lead to a limited denial-of-service (DoS).  There is no control plane exposure; this is a data plane issue only.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:f5:nginx:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.29.1",
          "versionEndExcluding" : "1.34.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-04T01:15Z",
    "lastModifiedDate" : "2025-04-10T18:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1696",
        "ASSIGNER" : "security@docker.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.docker.com/desktop/settings-and-maintenance/settings/#proxies",
          "name" : "https://docs.docker.com/desktop/settings-and-maintenance/settings/#proxies",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://docs.docker.com/desktop/troubleshoot-and-support/troubleshoot/#check-the-logs",
          "name" : "https://docs.docker.com/desktop/troubleshoot-and-support/troubleshoot/#check-the-logs",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability exists in Docker Desktop prior to version 4.39.0 that could lead to the unintentional disclosure of sensitive information via application logs. In affected versions, proxy configuration data—potentially including sensitive details—was written to log files in clear text whenever an HTTP GET request was made through a proxy. An attacker with read access to these logs could obtain the proxy information and leverage it for further attacks or unauthorized access. Starting with version 4.39.0, Docker Desktop no longer logs the proxy string, thereby mitigating this risk."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-06T12:15Z",
    "lastModifiedDate" : "2025-03-06T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1697",
        "ASSIGNER" : "hp-security-alert@hp.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.hp.com/us-en/document/ish_12269975-12269997-16/hpsbgn04008",
          "name" : "https://support.hp.com/us-en/document/ish_12269975-12269997-16/hpsbgn04008",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A potential security vulnerability has been identified in the HP Touchpoint Analytics Service for certain HP PC products with versions prior to 4.2.2439. This vulnerability could potentially allow a local attacker to escalate privileges. HP is providing software updates to mitigate this potential vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-18T18:15Z",
    "lastModifiedDate" : "2025-04-21T14:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1698",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://en-us.support.motorola.com/app/answers/detail/a_id/186728",
          "name" : "https://en-us.support.motorola.com/app/answers/detail/a_id/186728",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Null pointer exception vulnerabilities were reported in the fingerprint sensor service that could allow a local attacker to cause a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 2.8,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-11T17:15Z",
    "lastModifiedDate" : "2025-06-11T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1699",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://en-us.support.motorola.com/app/answers/detail/a_id/186729",
          "name" : "https://en-us.support.motorola.com/app/answers/detail/a_id/186729",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect default permissions vulnerability was reported in the MotoSignature application that could result in unauthorized access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.8,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.3,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-11T17:15Z",
    "lastModifiedDate" : "2025-06-11T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1700",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://en-us.support.motorola.com/app/answers/detail/a_id/186730/~/motorola-software-fix-installer-vulnerability",
          "name" : "https://en-us.support.motorola.com/app/answers/detail/a_id/186730/~/motorola-software-fix-installer-vulnerability",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://support.lenovo.com/us/en/product_security/LEN-194483",
          "name" : "https://support.lenovo.com/us/en/product_security/LEN-194483",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A DLL hijacking vulnerability was reported in the Motorola Software Fix (Rescue and Smart Assistant) installer that could allow a local attacker to escalate privileges during installation of the software."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-17T20:15Z",
    "lastModifiedDate" : "2025-07-17T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1701",
        "ASSIGNER" : "security@mimsoftware.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.mimsoftware.com/cve-2025-1701",
          "name" : "https://www.mimsoftware.com/cve-2025-1701",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CVE-2025-1701 is a high-severity vulnerability in the MIM Admin service. An attacker could exploit this vulnerability by sending a specially crafted request over the RMI interface to execute arbitrary code with the privileges of the MIM Admin service. The RMI interface is only accessible locally (listening on 127.0.0.1), limiting the attack vector to the local machine.  This means that in a properly configured hospital environment, an attacker must have already compromised the network and additionally compromised the system where the MIM Admin service is running.  From there, attackers with sufficient knowledge of MIM's implementation, library usage, and functionality with access to extend the MIM RMI library could force the MIM Admin service to run commands on the local machine with its privileges.\n\nUsers of MIM Software products exposed via RDP or multi-user application virtualization system should take note that the system being exposed is the environment hosting the virtualized MIM client.\n\n\n\nThis issue affects MIM Admin Service: before 7.2.13, 7.3.8, 7.4.3"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-04T14:15Z",
    "lastModifiedDate" : "2025-06-04T14:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1702",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ultimatemember/ultimatemember/pull/1654/commits/74647d42cc8d63f5d4f687efcd0792c246c23039",
          "name" : "https://github.com/ultimatemember/ultimatemember/pull/1654/commits/74647d42cc8d63f5d4f687efcd0792c246c23039",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.php#L1775",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.php#L1775",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.php#L1863",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-member/trunk/includes/core/class-member-directory.php#L1863",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3249862/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3249862/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/ultimate-member/#developers",
          "name" : "https://wordpress.org/plugins/ultimate-member/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/34adbae5-d615-4f8d-a845-6741d897f06c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/34adbae5-d615-4f8d-a845-6741d897f06c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Member – User Profile, Registration, Login, Member Directory, Content Restriction & Membership Plugin plugin for WordPress is vulnerable to time-based SQL Injection via the 'search' parameter in all versions up to, and including, 2.10.0 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-05T12:15Z",
    "lastModifiedDate" : "2025-03-05T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1703",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/extensions/responsive-control/class-responsive-control.php#L46",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-blocks/trunk/src/extensions/responsive-control/class-responsive-control.php#L46",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3260377",
          "name" : "https://plugins.trac.wordpress.org/changeset/3260377",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3260377/ultimate-blocks/trunk/src/extensions/responsive-control/class-responsive-control.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3260377/ultimate-blocks/trunk/src/extensions/responsive-control/class-responsive-control.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/ultimate-blocks/#developers",
          "name" : "https://wordpress.org/plugins/ultimate-blocks/#developers",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2520d98-3cee-4431-bf9c-b2fd01a584ce?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a2520d98-3cee-4431-bf9c-b2fd01a584ce?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ultimate Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘content’ parameter in all versions up to, and including, 3.2.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T10:15Z",
    "lastModifiedDate" : "2025-03-26T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1704",
        "ASSIGNER" : "chromeos-security@chromium.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://issues.chromium.org/issues/b/359915523",
          "name" : "https://issues.chromium.org/issues/b/359915523",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://issuetracker.google.com/issues/359915523",
          "name" : "https://issuetracker.google.com/issues/359915523",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Mailing List", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "ComponentInstaller Modification in ComponentInstaller in Google ChromeOS 15823.23.0 on Chromebooks allows enrolled users with local access to unenroll devices \nand intercept device management requests via loading components from the unencrypted stateful partition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:google:chrome_os:15823.23.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T23:15Z",
    "lastModifiedDate" : "2025-07-11T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1705",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://tagdiv.com/newspaper-changelog/",
          "name" : "https://tagdiv.com/newspaper-changelog/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://tagdiv.com/tagdiv-composer-page-builder-basics/",
          "name" : "https://tagdiv.com/tagdiv-composer-page-builder-basics/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://themeforest.net/item/newspaper/5489609",
          "name" : "https://themeforest.net/item/newspaper/5489609",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaa8c34-cf7b-4630-adc8-cbb534deff89?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2aaa8c34-cf7b-4630-adc8-cbb534deff89?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The tagDiv Composer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 5.3. This is due to missing or incorrect nonce validation within the td_ajax_get_views AJAX action. This makes it possible for unauthenticated attackers to inject malicious web scripts via a forged request granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-28T09:15Z",
    "lastModifiedDate" : "2025-03-28T18:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1706",
        "ASSIGNER" : "security@imgtec.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "name" : "https://www.imaginationtech.com/gpu-driver-vulnerabilities/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Software installed and run as a non-privileged user may conduct improper GPU system calls to trigger use-after-free kernel exceptions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-17T01:15Z",
    "lastModifiedDate" : "2025-05-19T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1707",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/review-schema/tags/2.2.4/app/Shortcodes/ReviewSchema.php#L108",
          "name" : "https://plugins.trac.wordpress.org/browser/review-schema/tags/2.2.4/app/Shortcodes/ReviewSchema.php#L108",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3253799/review-schema",
          "name" : "https://plugins.trac.wordpress.org/changeset/3253799/review-schema",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b4de243-d337-4f29-a766-bcafb3848d1c?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9b4de243-d337-4f29-a766-bcafb3848d1c?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Review Schema plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 2.2.4 via post meta. This makes it possible for authenticated attackers, with contributor-level and above permissions, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-11T22:15Z",
    "lastModifiedDate" : "2025-03-11T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1708",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.endress.com",
          "name" : "https://www.endress.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The application is vulnerable to SQL injection attacks. An attacker is able to dump the PostgreSQL database and read its content."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-03T12:15Z",
    "lastModifiedDate" : "2025-07-03T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1709",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.endress.com",
          "name" : "https://www.endress.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Several credentials for the local PostgreSQL database are stored in plain text (partially base64 encoded)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-03T12:15Z",
    "lastModifiedDate" : "2025-07-03T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1710",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.endress.com",
          "name" : "https://www.endress.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The maxView Storage Manager does not implement sufficient measures to prevent multiple failed authentication attempts within a short time frame, making it susceptible to brute-force attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-03T12:15Z",
    "lastModifiedDate" : "2025-07-03T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1711",
        "ASSIGNER" : "psirt@sick.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sick.com/psirt",
          "name" : "https://sick.com/psirt",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "name" : "https://www.cisa.gov/resources-tools/resources/ics-recommended-practices",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.endress.com",
          "name" : "https://www.endress.com",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.first.org/cvss/calculator/3.1",
          "name" : "https://www.first.org/cvss/calculator/3.1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.json",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "name" : "https://www.sick.com/.well-known/csaf/white/2025/sca-2025-0008.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple services of the DUT as well as different scopes of the same service reuse the same credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-03T12:15Z",
    "lastModifiedDate" : "2025-07-03T15:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1712",
        "ASSIGNER" : "security@checkmk.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://checkmk.com/werk/17996",
          "name" : "https://checkmk.com/werk/17996",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Argument injection in special agent configuration in Checkmk <2.4.0p1, <2.3.0p32, <2.2.0p42 and 2.1.0 allows authenticated attackers to write arbitrary files"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-21T09:15Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1713",
        "ASSIGNER" : "security@xen.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/27/1",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/27/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/27/3",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/27/3",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://www.openwall.com/lists/oss-security/2025/02/28/1",
          "name" : "http://www.openwall.com/lists/oss-security/2025/02/28/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "http://xenbits.xen.org/xsa/advisory-467.html",
          "name" : "http://xenbits.xen.org/xsa/advisory-467.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://xenbits.xenproject.org/xsa/advisory-467.html",
          "name" : "https://xenbits.xenproject.org/xsa/advisory-467.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When setting up interrupt remapping for legacy PCI(-X) devices,\nincluding PCI(-X) bridges, a lookup of the upstream bridge is required.\nThis lookup, itself involving acquiring of a lock, is done in a context\nwhere acquiring that lock is unsafe.  This can lead to a deadlock."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-17T14:15Z",
    "lastModifiedDate" : "2025-07-17T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1714",
        "ASSIGNER" : "security@perforce.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://portal.perforce.com/s/detail/a91PA000001ScY1YAK",
          "name" : "https://portal.perforce.com/s/detail/a91PA000001ScY1YAK",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Lack of Rate Limiting in Sign-up workflow in Perforce Gliffy prior to version 4.14.0-7 on Gliffy online allows attacker to enumerate valid user emails and potentially DOS the server"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T15:15Z",
    "lastModifiedDate" : "2025-03-07T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1716",
        "ASSIGNER" : "security@sonatype.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d",
          "name" : "https://github.com/mmaitre314/picklescan/commit/78ce704227c51f070c0c5fb4b466d92c62a7aa3d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v",
          "name" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1716",
          "name" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1716",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "picklescan before 0.0.21 does not treat 'pip' as an unsafe global. An attacker could craft a malicious model that uses Pickle to pull in a malicious PyPI package (hosted, for example, on pypi.org or GitHub) via `pip.main()`. Because pip is not a restricted global, the model, when scanned with picklescan, would pass security checks and appear to be safe, when it could instead prove to be problematic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T15:15Z",
    "lastModifiedDate" : "2025-03-03T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1717",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          }, {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/login-me-now/tags/1.7.2/app/Logins/BrowserTokenLogin/AutoLogin.php#L24",
          "name" : "https://plugins.trac.wordpress.org/browser/login-me-now/tags/1.7.2/app/Logins/BrowserTokenLogin/AutoLogin.php#L24",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc689622-50d6-47c4-a5f6-0314b1a207c9?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fc689622-50d6-47c4-a5f6-0314b1a207c9?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Login Me Now plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 1.7.2. This is due to insecure authentication based on an arbitrary transient name in the 'AutoLogin::listen()' function. This makes it possible for unauthenticated attackers to log in an existing user on the site, even an administrator. Note: this vulnerability requires using a transient name and value from another software, so the plugin is not inherently vulnerable on it's own."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pluginly:login_me_now:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.7.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-27T08:15Z",
    "lastModifiedDate" : "2025-03-11T16:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1718",
        "ASSIGNER" : "cybersecurity@hitachienergy.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000174&LanguageCode=en&DocumentPartId=&Action=Launch",
          "name" : "https://publisher.hitachienergy.com/preview?DocumentID=8DBD000174&LanguageCode=en&DocumentPartId=&Action=Launch",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An authenticated user with file access privilege via FTP access can cause the Relion 670/650 and SAM600-IO series device to reboot due to improper disk space management."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-24T12:15Z",
    "lastModifiedDate" : "2025-06-24T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1723",
        "ASSIGNER" : "cna@manageengine.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.manageengine.com/products/self-service-password/advisory/CVE-2025-1723.html",
          "name" : "https://www.manageengine.com/products/self-service-password/advisory/CVE-2025-1723.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Zohocorp ManageEngine ADSelfService Plus versions 6510 and below are vulnerable to account takeover due to the session mishandling. Valid account holders in the setup only have the potential to exploit this bug."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T08:15Z",
    "lastModifiedDate" : "2025-03-03T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1724",
        "ASSIGNER" : "cna@manageengine.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.manageengine.com/analytics-plus/CVE-2025-1724.html",
          "name" : "https://www.manageengine.com/analytics-plus/CVE-2025-1724.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.zoho.com/analytics/onpremise/CVE-2025-1724.html",
          "name" : "https://www.zoho.com/analytics/onpremise/CVE-2025-1724.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Zohocorp's ManageEngine Analytics Plus and Zoho Analytics on-premise versions older than 6130 are vulnerable to an AD only account takeover because of a hardcoded sensitive token."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T07:15Z",
    "lastModifiedDate" : "2025-03-17T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1725",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/file-manager/tags/6.6.3/backend/app/Http/Controllers/FileManagerController.php#L112",
          "name" : "https://plugins.trac.wordpress.org/browser/file-manager/tags/6.6.3/backend/app/Http/Controllers/FileManagerController.php#L112",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/84ddb481-f989-4ba8-9925-e8327c30de38?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/84ddb481-f989-4ba8-9925-e8327c30de38?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Bit File Manager – 100% Free & Open Source File Manager and Code Editor for WordPress plugin for WordPress is vulnerable to Stored Cross-Site Scripting via SVG File uploads in all versions up to, and including, 6.7 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses the SVG file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-03T09:15Z",
    "lastModifiedDate" : "2025-06-03T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1726",
        "ASSIGNER" : "psirt@esri.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.esri.com/arcgis-blog/products/monitor/administration/whats-new-in-arcgis-monitor-2024-1/",
          "name" : "https://www.esri.com/arcgis-blog/products/monitor/administration/whats-new-in-arcgis-monitor-2024-1/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "There is a SQL injection issue in Esri ArcGIS Monitor versions 2023.0 through 2024.x on Windows and Linux that allows a remote, authenticated attacker with low privileges to improperly read limited database schema information by passing crafted queries. While it is possible to enumerate some internal database identifiers, the impact to the confidentiality vector is \"LOW' because any sensitive data returned in a response is encrypted. There is no evidence of impact to the integrity or availability vectors. This issue is addressed in ArcGIS Monitor 2024.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-26T20:15Z",
    "lastModifiedDate" : "2025-02-26T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1727",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1390"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-191-10",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The protocol used for remote linking over RF for End-of-Train and \nHead-of-Train (also known as a FRED) relies on a BCH checksum for packet\n creation. It is possible to create these EoT and HoT packets with a \nsoftware defined radio and issue brake control commands to the EoT \ndevice, disrupting operations or potentially overwhelming the brake \nsystems."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-10T23:15Z",
    "lastModifiedDate" : "2025-07-10T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1728",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T22:15Z",
    "lastModifiedDate" : "2025-02-26T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1729",
        "ASSIGNER" : "psirt@lenovo.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.lenovo.com/us/en/product_security/LEN-189489",
          "name" : "https://support.lenovo.com/us/en/product_security/LEN-189489",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A DLL hijacking vulnerability was reported in TrackPoint Quick Menu software that, under certain conditions, could allow a local attacker to escalate privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-07-17T20:15Z",
    "lastModifiedDate" : "2025-07-17T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1730",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/simple-download-counter/tags/2.0/inc/functions-core.php#L328",
          "name" : "https://plugins.trac.wordpress.org/browser/simple-download-counter/tags/2.0/inc/functions-core.php#L328",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/simple-download-counter/tags/2.0/inc/functions-core.php#L354",
          "name" : "https://plugins.trac.wordpress.org/browser/simple-download-counter/tags/2.0/inc/functions-core.php#L354",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3247987/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3247987/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0eafb20-4ef2-448b-9da7-ad8aa9e45215?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d0eafb20-4ef2-448b-9da7-ad8aa9e45215?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Simple Download Counter plugin for WordPress is vulnerable to Arbitrary File Read in all versions up to, and including, 2.0 via the 'simple_download_counter_download_handler'. This makes it possible for authenticated attackers, with Author-level access and above, to extract sensitive data including any local file on the server, such as wp-config.php or /etc/passwd."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-01T07:15Z",
    "lastModifiedDate" : "2025-03-01T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1731",
        "ASSIGNER" : "security@zyxel.com.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://seclists.org/fulldisclosure/2025/Apr/27",
          "name" : "http://seclists.org/fulldisclosure/2025/Apr/27",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025",
          "name" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An incorrect permission assignment vulnerability in the PostgreSQL commands of the Zyxel USG FLEX H series uOS firmware versions from V1.20 through V1.31 could allow an authenticated local attacker with low privileges to gain access to the Linux shell and escalate their privileges by crafting malicious scripts or modifying system configurations with administrator-level access through a stolen token. Modifying the system configuration is only possible if the administrator has not logged out and the token remains valid."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-22T03:15Z",
    "lastModifiedDate" : "2025-06-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1732",
        "ASSIGNER" : "security@zyxel.com.tw"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025",
          "name" : "https://www.zyxel.com/global/en/support/security-advisories/zyxel-security-advisory-for-incorrect-permission-assignment-and-improper-privilege-management-vulnerabilities-in-usg-flex-h-series-firewalls-04-22-2025",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An improper privilege management vulnerability in the recovery function of the Zyxel USG FLEX H series uOS firmware version V1.31 and earlier could allow an authenticated local attacker with administrator privileges to upload a crafted configuration file and escalate privileges on a vulnerable device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-22T03:15Z",
    "lastModifiedDate" : "2025-06-12T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1734",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-pcmh-g36c-qc44",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250523-0009/",
          "name" : "https://security.netapp.com/advisory/ntap-20250523-0009/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when receiving headers from HTTP server, the headers missing a colon (:) are treated as valid headers even though they are not. This may confuse applications into accepting invalid headers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.32",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.28",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.19",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.5",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-30T06:15Z",
    "lastModifiedDate" : "2025-07-02T20:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1735",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-hrwm-9436-5mv3",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP versions:8.1.* before 8.1.33, 8.2.* before 8.2.29, 8.3.* before 8.3.23, 8.4.* pgsql and pdo_pgsql escaping functions do not check if the underlying quoting functions returned errors. This could cause crashes if Postgres server rejects the string as invalid."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.33",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.29",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.23",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-07-13T23:15Z",
    "lastModifiedDate" : "2025-07-22T17:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1736",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-hgf5-96fm-v528",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250523-0006/",
          "name" : "https://security.netapp.com/advisory/ntap-20250523-0006/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when user-supplied headers are sent, the insufficient validation of the end-of-line characters may prevent certain headers from being sent or lead to certain headers be misinterpreted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.32",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.28",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.19",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.5",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 7.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-30T06:15Z",
    "lastModifiedDate" : "2025-07-02T20:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1737",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1738",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-598"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Password Transmitted over Query String vulnerability has been found in Trivision Camera NC227WF v5.8.0 from TrivisionSecurity, exposing this sensitive information to a third party."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T13:15Z",
    "lastModifiedDate" : "2025-02-27T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1739",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-trivision-camera-nc227wf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An Authentication Bypass vulnerability has been found in Trivision Camera NC227WF v5.8.0 from TrivisionSecurity. This vulnerability allows an attacker to retrieve administrator's credentials in cleartext by sending a request against the server using curl with random credentials to \"/en/player/activex_pal.asp\" and successfully authenticating the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T13:15Z",
    "lastModifiedDate" : "2025-02-27T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1741",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          }, {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gist.github.com/mcdruid/cb0b848c12fd6a6bc0c1b3357b983d30",
          "name" : "https://gist.github.com/mcdruid/cb0b848c12fd6a6bc0c1b3357b983d30",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/b1gMail-OSS/b1gMail/commit/4816c8b748f6a5b965c8994e2cf10861bf6e68aa",
          "name" : "https://github.com/b1gMail-OSS/b1gMail/commit/4816c8b748f6a5b965c8994e2cf10861bf6e68aa",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/b1gMail-OSS/b1gMail/releases/tag/7.4.1-pl2",
          "name" : "https://github.com/b1gMail-OSS/b1gMail/releases/tag/7.4.1-pl2",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.297829",
          "name" : "VDB-297829 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.297829",
          "name" : "VDB-297829 | b1gMail Admin Page users.php deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.505838",
          "name" : "Submit #505838 | b1gMail-OSS b1gMail 7.4.1-pl1 Deserialization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.b1gmail.eu/forum/thread/217-security-update-to-b1gmail-7-4-1-released/",
          "name" : "https://www.b1gmail.eu/forum/thread/217-security-update-to-b1gmail-7-4-1-released/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in b1gMail up to 7.4.1-pl1. Affected by this vulnerability is an unknown functionality of the file src/admin/users.php of the component Admin Page. The manipulation of the argument query/q leads to deserialization. The attack can be launched remotely. Upgrading to version 7.4.1-pl2 is able to address this issue. The identifier of the patch is 4816c8b748f6a5b965c8994e2cf10861bf6e68aa. It is recommended to upgrade the affected component. The vendor acted highly professional and even fixed this issue in the discontinued commercial edition as b1gMail 7.4.0-pl3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-02-27T16:15Z",
    "lastModifiedDate" : "2025-02-27T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1742",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac_xss_home.md",
          "name" : "https://github.com/janssensjelle/published-pocs/blob/main/pihomehvac_xss_home.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.297830",
          "name" : "VDB-297830 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.297830",
          "name" : "VDB-297830 | pihome-shc PiHome home.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502501",
          "name" : "Submit #502501 | pihome-shc PiHome HVAC 2.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in pihome-shc PiHome 2.0. Affected by this issue is some unknown functionality of the file /home.php. The manipulation of the argument page_name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T17:15Z",
    "lastModifiedDate" : "2025-03-24T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1743",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sheratan4/cve/issues/4",
          "name" : "https://github.com/sheratan4/cve/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.297831",
          "name" : "VDB-297831 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.297831",
          "name" : "VDB-297831 | zyx0814 Pichome index.php path traversal",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502168",
          "name" : "Submit #502168 | https://github.com/zyx0814/Pichome Pichome 2.1.0 Arbitrary file read",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in zyx0814 Pichome 2.1.0. This affects an unknown part of the file /index.php?mod=textviewer. The manipulation of the argument src leads to path traversal. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-27T18:15Z",
    "lastModifiedDate" : "2025-02-27T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1744",
        "ASSIGNER" : "cve_disclosure@tech.gov.sg"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/radareorg/radare2/pull/23969",
          "name" : "https://github.com/radareorg/radare2/pull/23969",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory", "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds Write vulnerability in radareorg radare2 allows \n\nheap-based buffer over-read or buffer overflow.This issue affects radare2: before <5.9.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.9.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-28T04:15Z",
    "lastModifiedDate" : "2025-07-01T14:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1745",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/LinZhaoguan/pb-cms/issues/IBMM8V",
          "name" : "https://gitee.com/LinZhaoguan/pb-cms/issues/IBMM8V",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.297832",
          "name" : "VDB-297832 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.297832",
          "name" : "VDB-297832 | LinZhaoguan pb-cms Logout cross-site request forgery",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502342",
          "name" : "Submit #502342 | LinZhaoguan pb-cms v2.0 Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in LinZhaoguan pb-cms 2.0 and classified as problematic. This vulnerability affects unknown code of the component Logout. The manipulation leads to cross-site request forgery. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-27T18:15Z",
    "lastModifiedDate" : "2025-02-27T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1746",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "name" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Scripting vulnerability in OpenCart versions prior to 4.1.0. This vulnerability allows an attacker to execute JavaScript code in the victim's browser by sending the victim a malicious URL using the search in the /product/search endpoint. This vulnerability could be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.1.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T14:15Z",
    "lastModifiedDate" : "2025-05-07T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1747",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "name" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/login."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.1.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-28T14:15Z",
    "lastModifiedDate" : "2025-05-07T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1748",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "name" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/register."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.1.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-28T14:15Z",
    "lastModifiedDate" : "2025-05-07T19:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1749",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "name" : "https://www.incibe.es/incibe-cert/alerta-temprana/avisos/multiples-vulnerabilidades-en-opencart",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "HTML injection vulnerabilities in OpenCart versions prior to 4.1.0. These vulnerabilities could allow an attacker to modify the HTML of the victim's browser by sending a malicious URL and modifying the parameter name in /account/voucher."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:opencart:opencart:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.1.0.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-28T14:15Z",
    "lastModifiedDate" : "2025-05-07T19:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1750",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/run-llama/llama_index/commit/369a2942df2efcf6b74461c45d20a0af1fbe4ae2",
          "name" : "https://github.com/run-llama/llama_index/commit/369a2942df2efcf6b74461c45d20a0af1fbe4ae2",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/e1302233-9180-4269-9047-1526247d2cd8",
          "name" : "https://huntr.com/bounties/e1302233-9180-4269-9047-1526247d2cd8",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An SQL injection vulnerability exists in the delete function of DuckDBVectorStore in run-llama/llama_index version v0.12.19. This vulnerability allows an attacker to manipulate the ref_doc_id parameter, enabling them to read and write arbitrary files on the server, potentially leading to remote code execution (RCE)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.12.19",
          "versionEndExcluding" : "0.12.21",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T10:15Z",
    "lastModifiedDate" : "2025-07-31T16:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1751",
        "ASSIGNER" : "cve@atisoluciones.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.atisoluciones.com/incidentes-cve",
          "name" : "https://www.atisoluciones.com/incidentes-cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A SQL Injection vulnerability has been found in Ciges 2.15.5 from ATISoluciones. This vulnerability allows an attacker to retrieve, create, update and delete database via $idServicio parameter in /modules/ajaxBloqueaCita.php endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-27T12:15Z",
    "lastModifiedDate" : "2025-02-27T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1752",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/run-llama/llama_index/commit/3c65db2947271de3bd1927dc66a044da385de4da",
          "name" : "https://github.com/run-llama/llama_index/commit/3c65db2947271de3bd1927dc66a044da385de4da",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/cd7b9082-7d75-42e4-84f5-dbee23cbc467",
          "name" : "https://huntr.com/bounties/cd7b9082-7d75-42e4-84f5-dbee23cbc467",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://huntr.com/bounties/cd7b9082-7d75-42e4-84f5-dbee23cbc467",
          "name" : "https://huntr.com/bounties/cd7b9082-7d75-42e4-84f5-dbee23cbc467",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Denial of Service (DoS) vulnerability has been identified in the KnowledgeBaseWebReader class of the run-llama/llama_index project, affecting version ~ latest(v0.12.15). The vulnerability arises due to inappropriate secure coding measures, specifically the lack of proper implementation of the max_depth parameter in the get_article_urls function. This allows an attacker to exhaust Python's recursion limit through repeated function calls, leading to resource consumption and ultimately crashing the Python process."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.3.6",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-10T14:15Z",
    "lastModifiedDate" : "2025-07-29T14:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1753",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/run-llama/llama_index/commit/b57e76738c53ca82d88658b82f2d82d1c7839c7d",
          "name" : "https://github.com/run-llama/llama_index/commit/b57e76738c53ca82d88658b82f2d82d1c7839c7d",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/19e1c67e-1d77-451d-b10b-acbe99900b22",
          "name" : "https://huntr.com/bounties/19e1c67e-1d77-451d-b10b-acbe99900b22",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "LLama-Index CLI version v0.12.20 contains an OS command injection vulnerability. The vulnerability arises from the improper handling of the `--files` argument, which is directly passed into `os.system`. An attacker who controls the content of this argument can inject and execute arbitrary shell commands. This vulnerability can be exploited locally if the attacker has control over the CLI arguments, and remotely if a web application calls the LLama-Index CLI with a user-controlled filename. This issue can lead to arbitrary code execution on the affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:llamaindex:llamaindex:0.12.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-28T10:15Z",
    "lastModifiedDate" : "2025-08-07T00:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1754",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/521619",
          "name" : "GitLab Issue #521619",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://hackerone.com/reports/3009067",
          "name" : "HackerOne Bug Bounty Report #3009067",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab CE/EE affecting all versions from 17.2 before 17.11.5, 18.0 before 18.0.3, and 18.1 before 18.1.1 that could have allowed unauthenticated attackers to upload arbitrary files to public projects by sending crafted API requests, potentially leading to resource abuse and unauthorized content storage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.2.0",
          "versionEndExcluding" : "17.11.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "18.0.0",
          "versionEndExcluding" : "18.0.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:18.1.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-26T06:15Z",
    "lastModifiedDate" : "2025-08-12T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1755",
        "ASSIGNER" : "cna@mongodb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1755.html",
          "name" : "https://access.redhat.com/errata/RHSA-2025:1755.html",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://jira.mongodb.org/browse/COMPASS-9058",
          "name" : "https://jira.mongodb.org/browse/COMPASS-9058",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "MongoDB Compass may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privileges, when a crafted file is stored in C:\\node_modules\\. This issue affects MongoDB Compass prior to 1.42.1"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:mongodb:compass:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "1.42.1",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.0_aarch64:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.0_s390x:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_update_services_for_sap_solutions:9.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_for_power_little_endian_update_services_for_sap_solutions:9.0_ppc64le:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-27T16:15Z",
    "lastModifiedDate" : "2025-04-09T14:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1756",
        "ASSIGNER" : "cna@mongodb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-426"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1756",
          "name" : "https://access.redhat.com/errata/RHSA-2025:1756",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://jira.mongodb.org/browse/MONGOSH-2028",
          "name" : "https://jira.mongodb.org/browse/MONGOSH-2028",
          "refsource" : "",
          "tags" : [ "Vendor Advisory", "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "mongosh may be susceptible to local privilege escalation under certain conditions potentially enabling unauthorized actions on a user's system with elevated privilege, when a crafted file is stored in C:\\node_modules\\. This issue affects mongosh prior to 2.3.0"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mongodb:mongosh:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2.3.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_arm_64:9.4_aarch64:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems:9.4_s390x:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_arm_64_eus:9.4_aarch64:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_server_aus:9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:redhat:enterprise_linux_eus:9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:enterprise_linux_update_services_for_sap_solutions:9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:codeready_linux_builder_eus:9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:codeready_linux_builder_for_ibm_z_systems_eus:9.4_s390x:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:codeready_linux_builder_for_arm64_eus:9.4_aarch64:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:redhat:codeready_linux_builder_for_power_little_endian_eus:9.4_ppc64le:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-27T16:15Z",
    "lastModifiedDate" : "2025-04-09T14:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1757",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L39",
          "name" : "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L39",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L542",
          "name" : "https://plugins.trac.wordpress.org/browser/uber-grid/trunk/src/Frontend.php#L542",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/36dcf1c4-1e0a-4ab6-a1b3-a9fe3aaddd0b?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/36dcf1c4-1e0a-4ab6-a1b3-a9fe3aaddd0b?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The WordPress Portfolio Builder – Portfolio Gallery plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the plugin's 'pfhub_portfolio' and 'pfhub_portfolio_portfolio' shortcodes in all versions up to, and including, 1.1.7 due to insufficient input sanitization and output escaping on user supplied attributes. This makes it possible for authenticated attackers, with contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:portfoliohub:portfoliohub:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "1.1.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-28T05:15Z",
    "lastModifiedDate" : "2025-03-06T20:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1758",
        "ASSIGNER" : "security@progress.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://docs.progress.com/bundle/release-notes_loadmaster-7-2-61-1/page/Security-Updates.html",
          "name" : "https://docs.progress.com/bundle/release-notes_loadmaster-7-2-61-1/page/Security-Updates.html",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Input Validation vulnerability in Progress LoadMaster allows : Buffer OverflowThis issue affects:\n\n* LoadMaster: 7.2.40.0 and above\n\n* ECS: All versions\n\n* Multi-Tenancy: 7.1.35.4 and above"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:progress:loadmaster:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.40.0",
          "versionEndExcluding" : "7.2.61.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:progress:multi-tenant_loadmaster:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.35.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-19T16:15Z",
    "lastModifiedDate" : "2025-07-31T18:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1759",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-244"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7242354",
          "name" : "https://www.ibm.com/support/pages/node/7242354",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Concert Software 1.0.0 through 1.1.0 could allow a remote attacker to obtain sensitive information from allocated memory due to improper clearing of heap memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-08-18T14:15Z",
    "lastModifiedDate" : "2025-08-18T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1762",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/",
          "name" : "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/",
          "name" : "https://wpscan.com/vulnerability/d5cefdee-2ba0-465d-b176-0dff39fc322c/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Event Tickets with Ticket Scanner WordPress plugin before 2.5.4 does not have CSRF check in place when updating its settings, which could allow attackers to make a logged in admin change them via a CSRF attack"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:vollstart:event_tickets_with_ticket_scanner:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.5.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-28T06:15Z",
    "lastModifiedDate" : "2025-04-17T13:48Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1763",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/521718",
          "name" : "GitLab Issue #521718",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/3016600",
          "name" : "HackerOne Bug Bounty Report #3016600",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE that allows for cross-site-scripting attack and content security policy bypass in a user's browser under specific conditions, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.6.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.6.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-30T11:15Z",
    "lastModifiedDate" : "2025-08-08T18:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1764",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.svn.wordpress.org/loginpress/trunk/lib/wpb-sdk/views/wpb-debug.php",
          "name" : "https://plugins.svn.wordpress.org/loginpress/trunk/lib/wpb-sdk/views/wpb-debug.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3253283/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3253283/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://pt.wordpress.org/plugins/loginpress/",
          "name" : "https://pt.wordpress.org/plugins/loginpress/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9df6a2b4-2dc4-43dd-8282-5c05b0fa13f6?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9df6a2b4-2dc4-43dd-8282-5c05b0fa13f6?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The LoginPress | wp-login Custom Login Page Customizer plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 3.3.1. This is due to missing or incorrect nonce validation on the 'custom_plugin_set_option' function. This makes it possible for unauthenticated attackers to update arbitrary options on the WordPress site via a forged request granted they can trick a site administrator into performing an action such as clicking on a link. This can be leveraged to update the default role for registration to administrator and enable user registration for attackers to gain administrative user access to a vulnerable site. The 'WPBRIGADE_SDK__DEV_MODE' constant must be set to 'true' to exploit the vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-14T06:15Z",
    "lastModifiedDate" : "2025-03-14T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1766",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/core/Order/PaymentController.php#L97",
          "name" : "http://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/core/Order/PaymentController.php#L97",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3257023/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3257023/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f2bcaff9-bf04-4d8e-9422-c433264067ff?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/f2bcaff9-bf04-4d8e-9422-c433264067ff?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to unauthorized modification of data due to a missing capability check on the 'payment_complete' function in all versions up to, and including, 4.0.24. This makes it possible for unauthenticated attackers to update the status of ticket payments to 'completed', possibly resulting in financial loss."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.0.25",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-20T06:15Z",
    "lastModifiedDate" : "2025-08-11T18:04Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1767",
        "ASSIGNER" : "security@kubernetes.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/03/13/9",
          "name" : "http://www.openwall.com/lists/oss-security/2025/03/13/9",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/kubernetes/kubernetes/pull/130786",
          "name" : "https://github.com/kubernetes/kubernetes/pull/130786",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://groups.google.com/g/kubernetes-security-announce/c/19irihsKg7s",
          "name" : "https://groups.google.com/g/kubernetes-security-announce/c/19irihsKg7s",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "This CVE only affects Kubernetes clusters that utilize the in-tree gitRepo volume to clone git repositories from other pods within the same node. Since the in-tree gitRepo volume feature has been deprecated and will not receive security updates upstream, any cluster still using this feature remains vulnerable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-13T17:15Z",
    "lastModifiedDate" : "2025-03-13T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1768",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Assistant.php?rev=3207037#L55",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Assistant.php?rev=3207037#L55",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Audits.php?rev=3207037#L86",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Audits.php?rev=3207037#L86",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/BulkSeo.php?rev=3207037#L148",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/BulkSeo.php?rev=3207037#L148",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/FocusPages.php?rev=3207037#L107",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/FocusPages.php?rev=3207037#L107",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Onboarding.php?rev=3207037#L62",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Onboarding.php?rev=3207037#L62",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Post.php?rev=3207037#L480",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/controllers/Post.php?rev=3207037#L480",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L118",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L118",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L96",
          "name" : "https://plugins.trac.wordpress.org/browser/squirrly-seo/trunk/models/Snippet.php?rev=3207037#L96",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3248412/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3248412/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3250395/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3250395/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/squirrly-seo/#developers",
          "name" : "https://wordpress.org/plugins/squirrly-seo/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a23ee5c-275f-4d51-8199-1cc2b0086f73?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/1a23ee5c-275f-4d51-8199-1cc2b0086f73?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The SEO Plugin by Squirrly SEO plugin for WordPress is vulnerable to blind SQL Injection via the 'search' parameter in all versions up to, and including, 12.4.05 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for authenticated attackers, with Subscriber-level access and above, to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:squirrly:seo_plugin_by_squirrly_seo:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "12.4.06",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-07T11:15Z",
    "lastModifiedDate" : "2025-04-09T20:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1769",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L753",
          "name" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L753",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "name" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4df60fbe-4475-4cbf-b497-a9c5251bc91f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4df60fbe-4475-4cbf-b497-a9c5251bc91f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 2.5.0 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:product_import_export_for_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.5.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-26T12:15Z",
    "lastModifiedDate" : "2025-07-09T16:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1770",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/widgets/events-calendar/events-calendar.php#L715",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/widgets/events-calendar/events-calendar.php#L715",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/widgets/upcoming-event-tab/style/tab-1.php#L53",
          "name" : "https://plugins.trac.wordpress.org/browser/wp-event-solution/tags/4.0.24/widgets/upcoming-event-tab/style/tab-1.php#L53",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3257023/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3257023/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f24baee-7003-449b-9072-d95fa1e26c8f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5f24baee-7003-449b-9072-d95fa1e26c8f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Event Manager, Events Calendar, Tickets, Registrations – Eventin plugin for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 4.0.24 via the 'style' parameter. This makes it possible for authenticated attackers, with Contributor-level access and above, to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where images and other “safe” file types can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themewinter:eventin:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "4.0.25",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-20T06:15Z",
    "lastModifiedDate" : "2025-07-08T16:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1771",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          }, {
            "lang" : "en",
            "value" : "CWE-98"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://travelerwp.com/traveler-changelog/",
          "name" : "https://travelerwp.com/traveler-changelog/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/da3e3d6c-7643-4f22-aa88-2c4ce80aed1f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/da3e3d6c-7643-4f22-aa88-2c4ce80aed1f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Traveler theme for WordPress is vulnerable to Local File Inclusion in all versions up to, and including, 3.1.8 via the 'hotel_alone_load_more_post' function 'style' parameter. This makes it possible for unauthenticated attackers to include and execute arbitrary files on the server, allowing the execution of any PHP code in those files. This can be used to bypass access controls, obtain sensitive data, or achieve code execution in cases where php file type can be uploaded and included."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.1.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-15T05:15Z",
    "lastModifiedDate" : "2025-03-28T15:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1772",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1773",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://travelerwp.com/traveler-changelog/",
          "name" : "https://travelerwp.com/traveler-changelog/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c9dae7-d811-4b59-94c1-71a83652a14d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/46c9dae7-d811-4b59-94c1-71a83652a14d?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Traveler theme for WordPress is vulnerable to Reflected Cross-Site Scripting via multiple parameters in all versions up to, and including, 3.1.8 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that execute if they can successfully trick a user into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:shinecommerce:traveler:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.1.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-15T05:15Z",
    "lastModifiedDate" : "2025-03-28T15:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1774",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-142"
          }, {
            "lang" : "en",
            "value" : "CWE-143"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/03/CVE-2025-1774/",
          "name" : "https://cert.pl/en/posts/2025/03/CVE-2025-1774/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/03/CVE-2025-1774/",
          "name" : "https://cert.pl/posts/2025/03/CVE-2025-1774/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://nask.pl/instytut/dla-biznesu/botsense/",
          "name" : "https://nask.pl/instytut/dla-biznesu/botsense/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect string encoding vulnerability in NASK - PIB BotSense allows injection of an additional field separator character or value in the content of some fields of the generated event. A field with additional field separator characters or values can be included in the \"extraData\" field.This issue affects BotSense in versions before 2.8.0."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-17T15:15Z",
    "lastModifiedDate" : "2025-03-17T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1776",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-soteshop",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/cross-site-scripting-xss-vulnerability-soteshop",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Cross-Site Scripting (XSS) vulnerability in Soteshop, versions prior to 8.3.4, which could allow remote attackers to execute arbitrary code via the ‘query’ parameter in /app-google-custom-search/searchResults. This vulnerability can be exploited to steal sensitive user data, such as session cookies, or to perform actions on behalf of the user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T14:15Z",
    "lastModifiedDate" : "2025-02-28T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1777",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.seatheme.net/",
          "name" : "https://www.seatheme.net/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb3e0251-c3b7-4360-87f3-7e4612d4f285?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/fb3e0251-c3b7-4360-87f3-7e4612d4f285?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The BM Content Builder plugin for WordPress is vulnerable to unauthorized modification of data to a missing capability check on the 'ux_cb_page_options_save' function in all versions up to, and including, 3.16.2.1. This makes it possible for authenticated attackers, with subscriber-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-06T06:15Z",
    "lastModifiedDate" : "2025-06-06T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1778",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://themeforest.net/item/art-simple-clean-wordpress-theme-for-creatives/20170299",
          "name" : "https://themeforest.net/item/art-simple-clean-wordpress-theme-for-creatives/20170299",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c54c1fab-634d-4d1a-8234-8f1ae41c7cd4?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c54c1fab-634d-4d1a-8234-8f1ae41c7cd4?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Art Theme for WordPress is vulnerable to unauthorized access due to a missing capability check on the 'arttheme_theme_option_restore' AJAX function in all versions up to, and including, 3.12.2.3. This makes it possible for authenticated attackers, with subscriber-level access and above, to delete the theme option."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-06-06T06:15Z",
    "lastModifiedDate" : "2025-06-06T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1780",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3248127%40wc4bp&new=3248127%40wc4bp&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3248127%40wc4bp&new=3248127%40wc4bp&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc138cbb-2713-4b0a-8e3a-8e1a9266637f?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/dc138cbb-2713-4b0a-8e3a-8e1a9266637f?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The BuddyPress WooCommerce My Account Integration. Create WooCommerce Member Pages plugin for WordPress is vulnerable to unauthorized access due to a missing capability check on the wc4bp_delete_page() function in all versions up to, and including, 3.4.25. This makes it possible for authenticated attackers, with Subscriber-level access and above, to update the plugins page setting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:themekraft:buddypress_woocommerce_my_account_integration:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.4.26",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-01T04:15Z",
    "lastModifiedDate" : "2025-05-26T01:36Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1781",
        "ASSIGNER" : "security@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/google/security-research/security/advisories/GHSA-745m-xmq6-g6x7",
          "name" : "https://github.com/google/security-research/security/advisories/GHSA-745m-xmq6-g6x7",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "There is a XXE in W3CSS Validator versions before cssval-20250226 that allows an attacker to use specially-crafted XML objects to coerce server-side request forgery (SSRF).  This could be exploited to read arbitrary local files if an attacker has access to exception messages."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:w3:css_validator:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "20250226",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-28T14:15Z",
    "lastModifiedDate" : "2025-08-01T17:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1782",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: Red Hat Product Security has come to the conclusion that this CVE is not needed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-14T19:15Z",
    "lastModifiedDate" : "2025-04-30T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1783",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/gallery-styles/tags/1.3.4/gallery-styles.php#L34",
          "name" : "https://plugins.trac.wordpress.org/browser/gallery-styles/tags/1.3.4/gallery-styles.php#L34",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3251908/gallery-styles/trunk/gallery-styles.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3251908/gallery-styles/trunk/gallery-styles.php",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9443e36-648c-4984-8b06-28e9da959e26?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/c9443e36-648c-4984-8b06-28e9da959e26?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Gallery Styles plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the Gallery Block in all versions up to, and including, 1.3.4 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:tiptoppress:gallery_styles:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.3.5",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-08T10:15Z",
    "lastModifiedDate" : "2025-03-24T18:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1784",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-gutenberg/tags/2.19.0/classes/class-uagb-init-blocks.php#L1276",
          "name" : "https://plugins.trac.wordpress.org/browser/ultimate-addons-for-gutenberg/tags/2.19.0/classes/class-uagb-init-blocks.php#L1276",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3243058%40ultimate-addons-for-gutenberg&new=3243058%40ultimate-addons-for-gutenberg&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3243058%40ultimate-addons-for-gutenberg&new=3243058%40ultimate-addons-for-gutenberg&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac33fd5-602b-4810-96e1-850ea6ee739d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/9ac33fd5-602b-4810-96e1-850ea6ee739d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Spectra – WordPress Gutenberg Blocks plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the uagb block in all versions up to, and including, 2.19.0 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T06:15Z",
    "lastModifiedDate" : "2025-03-26T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1785",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3252990%40download-manager&new=3252990%40download-manager&sfp_email=&sfph_mail=#file4",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3252990%40download-manager&new=3252990%40download-manager&sfp_email=&sfph_mail=#file4",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc5c7974-4c10-4880-8823-2accee3c0da4?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/bc5c7974-4c10-4880-8823-2accee3c0da4?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Download Manager plugin for WordPress is vulnerable to Directory Traversal in all versions up to, and including, 3.3.08 via the 'wpdm_newfile' action. This makes it possible for authenticated attackers, with Author-level access and above, to overwrite select file types outside of the originally intended directory, which may cause a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:w3eden:download_manager:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "3.3.09",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-03-13T08:15Z",
    "lastModifiedDate" : "2025-07-08T15:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1786",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/rizinorg/rizin/issues/4893",
          "name" : "https://github.com/rizinorg/rizin/issues/4893",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rizinorg/rizin/issues/4893",
          "name" : "https://github.com/rizinorg/rizin/issues/4893",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rizinorg/rizin/milestone/18",
          "name" : "https://github.com/rizinorg/rizin/milestone/18",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/user-attachments/files/18765730/rz-bin-6fb50-poc.zip",
          "name" : "https://github.com/user-attachments/files/18765730/rz-bin-6fb50-poc.zip",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298007",
          "name" : "VDB-298007 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298007",
          "name" : "VDB-298007 | rizinorg rizin pdb.c msf_stream_directory_free buffer overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502317",
          "name" : "Submit #502317 | https://github.com/rizinorg/rizin rizin/rz-bin 309f57434dfa17954f02cdcbb3a2ac4108651767 Buffer Over-read",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in rizinorg rizin up to 0.7.4. It has been rated as critical. This issue affects the function msf_stream_directory_free in the library /librz/bin/pdb/pdb.c. The manipulation of the argument -P leads to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Upgrading to version 0.8.0 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-01T10:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1788",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/rizinorg/rizin/issues/4910",
          "name" : "https://github.com/rizinorg/rizin/issues/4910",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253",
          "name" : "https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253",
          "name" : "https://github.com/rizinorg/rizin/issues/4910#issuecomment-2662963253",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/rizinorg/rizin/pull/4762",
          "name" : "https://github.com/rizinorg/rizin/pull/4762",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/user-attachments/files/18817099/rz-bin-poc-01.zip",
          "name" : "https://github.com/user-attachments/files/18817099/rz-bin-poc-01.zip",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298011",
          "name" : "VDB-298011 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298011",
          "name" : "VDB-298011 | rizinorg rizin utf8.c rz_utf8_encode heap-based overflow",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502345",
          "name" : "Submit #502345 | https://github.com/rizinorg/rizin rizin/rz-bin 309f57434dfa17954f02cdcbb3a2ac4108651767 Buffer Overflow",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in rizinorg rizin up to 0.8.0. This affects the function rz_utf8_encode in the library /librz/util/utf8.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-01T13:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1791",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sheratan4/cve/issues/5",
          "name" : "https://github.com/sheratan4/cve/issues/5",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/sheratan4/cve/issues/5",
          "name" : "https://github.com/sheratan4/cve/issues/5",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298012",
          "name" : "VDB-298012 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298012",
          "name" : "VDB-298012 | Zorlan SkyCaiji Tool.php fileAction unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502648",
          "name" : "Submit #502648 | https://github.com/zorlan/skycaiji skycaiji 2.9 RCE",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Zorlan SkyCaiji 2.9 and classified as critical. This vulnerability affects the function fileAction of the file vendor/skycaiji/app/admin/controller/Tool.php. The manipulation of the argument save_data leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:skycaiji:skycaiji:2.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-01T14:15Z",
    "lastModifiedDate" : "2025-06-12T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1792",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 10.7.x <= 10.7.0, 10.5.x <= 10.5.3, 9.11.x <= 9.11.12 fail to properly enforce access controls for guest users accessing channel member information, allowing authenticated guest users to view metadata about members of public channels via the channel members API endpoint."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-30T15:15Z",
    "lastModifiedDate" : "2025-05-30T16:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1793",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e",
          "name" : "https://github.com/run-llama/llama_index/commit/0008041e8dde8e519621388e5d6f558bde6ef42e",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://huntr.com/bounties/8cb1555a-9655-4122-b0d6-60059e79183c",
          "name" : "https://huntr.com/bounties/8cb1555a-9655-4122-b0d6-60059e79183c",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://huntr.com/bounties/8cb1555a-9655-4122-b0d6-60059e79183c",
          "name" : "https://huntr.com/bounties/8cb1555a-9655-4122-b0d6-60059e79183c",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple vector store integrations in run-llama/llama_index version v0.12.21 have SQL injection vulnerabilities. These vulnerabilities allow an attacker to read and write data using SQL, potentially leading to unauthorized access to data of other users depending on the usage of the llama-index library in a web application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:llamaindex:llamaindex:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "0.12.21",
          "versionEndExcluding" : "0.12.28",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-05T05:15Z",
    "lastModifiedDate" : "2025-07-30T21:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1795",
        "ASSIGNER" : "cna@python.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48",
          "name" : "https://github.com/python/cpython/commit/09fab93c3d857496c0bd162797fab816c311ee48",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593",
          "name" : "https://github.com/python/cpython/commit/70754d21c288535e86070ca7a6e90dcb670b8593",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74",
          "name" : "https://github.com/python/cpython/commit/9148b77e0af91cdacaa7fe3dfac09635c3fe9a74",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/issues/100884",
          "name" : "https://github.com/python/cpython/issues/100884",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/pull/100885",
          "name" : "https://github.com/python/cpython/pull/100885",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/python/cpython/pull/119099",
          "name" : "https://github.com/python/cpython/pull/119099",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/",
          "name" : "https://mail.python.org/archives/list/security-announce@python.org/thread/MB62IZMEC3UM6SGHP5LET5JX2Y7H4ZUR/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "During an address list folding when a separating comma ends up on a folded line and that line is to be unicode-encoded then the separator itself is also unicode-encoded. Expected behavior is that the separating comma remains a plan comma. This can result in the address header being misinterpreted by some mail servers."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T19:15Z",
    "lastModifiedDate" : "2025-02-28T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1796",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-338"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/a60f3039-5394-4e22-8de7-a7da9c6a6e00",
          "name" : "https://huntr.com/bounties/a60f3039-5394-4e22-8de7-a7da9c6a6e00",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in langgenius/dify v0.10.1 allows an attacker to take over any account, including administrator accounts, by exploiting a weak pseudo-random number generator (PRNG) used for generating password reset codes. The application uses `random.randint` for this purpose, which is not suitable for cryptographic use and can be cracked. An attacker with access to workflow tools can extract the PRNG output and predict future password reset codes, leading to a complete compromise of the application."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:langgenius:dify:0.10.1:*:*:*:*:node.js:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-20T10:15Z",
    "lastModifiedDate" : "2025-07-16T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1797",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/chichi24-ver/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/chichi24-ver/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/chichi24-ver/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/chichi24-ver/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298028",
          "name" : "VDB-298028 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298028",
          "name" : "VDB-298028 | Hunan Zhonghe Baiyi Information Technology Baiyiyun Asset Management and Operations System anyUserBoundHouse.php sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502649",
          "name" : "Submit #502649 | Hunan Zhonghe Baiyi Information Technology Co., Ltd. Baiyiyun Asset Management and Operations System /wuser/anyUserBoundHouse.php SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Hunan Zhonghe Baiyi Information Technology Baiyiyun Asset Management and Operations System up to 20250217. Affected by this issue is some unknown functionality of the file /wuser/anyUserBoundHouse.php. The manipulation of the argument huid leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-01T15:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1798",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/c5c30191-857c-419c-9096-d1fe14d34eaa/",
          "name" : "https://wpscan.com/vulnerability/c5c30191-857c-419c-9096-d1fe14d34eaa/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The  does not sanitise and escape some parameters when outputting them back in a page, allowing unauthenticated users the ability to perform stored Cross-Site Scripting attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T06:15Z",
    "lastModifiedDate" : "2025-03-25T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1799",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sheratan4/cve/issues/6",
          "name" : "https://github.com/sheratan4/cve/issues/6",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/sheratan4/cve/issues/6",
          "name" : "https://github.com/sheratan4/cve/issues/6",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298029",
          "name" : "VDB-298029 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298029",
          "name" : "VDB-298029 | Zorlan SkyCaiji Tool.php previewAction server-side request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502650",
          "name" : "Submit #502650 | https://github.com/zorlan/skycaiji skycaiji 2.9 SSRF",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Zorlan SkyCaiji 2.9. This affects the function previewAction of the file vendor/skycaiji/app/admin/controller/Tool.php. The manipulation of the argument data leads to server-side request forgery. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:skycaiji:skycaiji:2.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-01T18:15Z",
    "lastModifiedDate" : "2025-06-12T20:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1800",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sjwszt/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/sjwszt/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/sjwszt/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/sjwszt/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354",
          "name" : "https://supportannouncement.us.dlink.com/security/publication.aspx?name=SAP10354",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298030",
          "name" : "VDB-298030 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298030",
          "name" : "VDB-298030 | D-Link DAR-7000 HTTP POST Request sxh_vpnlic.php get_ip_addr_details command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.502971",
          "name" : "Submit #502971 | D-Link Corporation D-Link DAR-7000-20-V3.2 DAR-7000-20-V3.2 Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in D-Link DAR-7000 3.2 and classified as critical. This vulnerability affects the function get_ip_addr_details of the file /view/vpn/sxh_vpn/sxh_vpnlic.php of the component HTTP POST Request Handler. The manipulation of the argument ethname leads to command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dar-7000_firmware:3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dar-7000:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-01T18:15Z",
    "lastModifiedDate" : "2025-05-21T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1801",
        "ASSIGNER" : "secalert@redhat.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://access.redhat.com/errata/RHSA-2025:1954",
          "name" : "RHSA-2025:1954",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://access.redhat.com/security/cve/CVE-2025-1801",
          "name" : "https://access.redhat.com/security/cve/CVE-2025-1801",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=2349081",
          "name" : "RHBZ#2349081",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A flaw was found in the Ansible aap-gateway. Concurrent requests handled by the gateway grpc service can result in concurrency issues due to race condition requests against the proxy. This issue potentially allows a less privileged user to obtain the JWT of a greater privileged user, enabling the server to be jeopardized. A user session or confidential data might be vulnerable."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T15:15Z",
    "lastModifiedDate" : "2025-03-03T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1802",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/extensions/scroll-to-top/assets/js/htmega-scroll-to-top.js",
          "name" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/extensions/scroll-to-top/assets/js/htmega-scroll-to-top.js",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_googlemap.php",
          "name" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_googlemap.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_notify.php",
          "name" : "https://plugins.trac.wordpress.org/browser/ht-mega-for-elementor/trunk/includes/widgets/htmega_notify.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3249106/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3249106/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3257530/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3257530/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/68530904-22d2-4228-b9f2-76f5ee1fd541?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/68530904-22d2-4228-b9f2-76f5ee1fd541?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The HT Mega – Absolute Addons For Elementor plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the ‘marker_title’, 'notification_content', and 'stt_button_text' parameters in all versions up to, and including, 2.8.3 due to insufficient input sanitization and output escaping. This makes it possible for authenticated attackers, with Contributor-level access and above, to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page. The vulnerability was partially patched in version 2.8.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:hasthemes:ht_mega:*:*:*:*:free:wordpress:*:*",
          "versionEndExcluding" : "2.8.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-20T12:15Z",
    "lastModifiedDate" : "2025-03-26T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1803",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: ** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. Reason: This candidate was issued in error. Notes: All references and descriptions in this candidate have been removed to prevent accidental usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-01T01:15Z",
    "lastModifiedDate" : "2025-03-01T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1804",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298040",
          "name" : "VDB-298040 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298040",
          "name" : "VDB-298040 | Blizzard Battle.Net profapi.dll uncontrolled search path",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.485034",
          "name" : "Submit #485034 | Blizzard Battle.net 2.39.0.15212 Command Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Blizzard Battle.Net up to 2.39.0.15212 on Windows and classified as critical. Affected by this issue is some unknown functionality in the library profapi.dll. The manipulation leads to uncontrolled search path. The attack needs to be approached locally. The complexity of an attack is rather high. The exploitation is known to be difficult. The vendor assigns this issue a low risk level."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-01T19:15Z",
    "lastModifiedDate" : "2025-03-07T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1805",
        "ASSIGNER" : "cve-request@security.metacpan.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://metacpan.org/release/HACHI/Crypt-Salt-0.01/source/lib/Crypt/Salt.pm#L76",
          "name" : "https://metacpan.org/release/HACHI/Crypt-Salt-0.01/source/lib/Crypt/Salt.pm#L76",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://perldoc.perl.org/functions/rand",
          "name" : "https://perldoc.perl.org/functions/rand",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.metacpan.org/docs/guides/random-data-for-security.html",
          "name" : "https://security.metacpan.org/docs/guides/random-data-for-security.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Crypt::Salt for Perl version 0.01 uses insecure rand() function when generating salts for cryptographic purposes."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-02T13:15Z",
    "lastModifiedDate" : "2025-04-03T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1806",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1WT5mJwL9NvKxBLIIj7TDbeAq6dchs5Gk/view",
          "name" : "https://drive.google.com/file/d/1WT5mJwL9NvKxBLIIj7TDbeAq6dchs5Gk/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://drive.google.com/file/d/1WT5mJwL9NvKxBLIIj7TDbeAq6dchs5Gk/view?usp=sharing",
          "name" : "https://drive.google.com/file/d/1WT5mJwL9NvKxBLIIj7TDbeAq6dchs5Gk/view?usp=sharing",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298064",
          "name" : "VDB-298064 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298064",
          "name" : "VDB-298064 | Eastnets PaymentSafe URL Default.aspx improper authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502539",
          "name" : "Submit #502539 | Eastnets PaymentSafe 2.5.26.0 Improper Authorization",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in Eastnets PaymentSafe 2.5.26.0. Affected by this issue is some unknown functionality of the file /Default.aspx of the component URL Handler. The manipulation leads to improper authorization. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.27.0 is able to address this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T00:15Z",
    "lastModifiedDate" : "2025-04-09T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1807",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://drive.google.com/file/d/1-4BwJxzKUdVRsi6PYh68mKzeIPAqug1Q/view",
          "name" : "https://drive.google.com/file/d/1-4BwJxzKUdVRsi6PYh68mKzeIPAqug1Q/view",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298065",
          "name" : "VDB-298065 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298065",
          "name" : "VDB-298065 | Eastnets PaymentSafe Edit Manual Reply directRouter.rfc cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.502668",
          "name" : "Submit #502668 | Eastnets PaymentSafe 2.5.26.0 HTML Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in Eastnets PaymentSafe 2.5.26.0. This affects an unknown part of the file /directRouter.rfc of the component Edit Manual Reply Handler. The manipulation of the argument Title leads to basic cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 2.5.27.0 is able to address this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T00:15Z",
    "lastModifiedDate" : "2025-04-09T13:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1808",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1808",
          "name" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1808",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298066",
          "name" : "VDB-298066 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298066",
          "name" : "VDB-298066 | Pixsoft E-Saphira Login Endpoint servlet sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.503260",
          "name" : "Submit #503260 | Pix Software E-Saphira 1.7.24 Blind Time Based SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Pixsoft E-Saphira 1.7.24 and classified as critical. This vulnerability affects unknown code of the file /servlet?act=login&tipo=1 of the component Login Endpoint. The manipulation of the argument txtUsuario leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T01:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1809",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1809",
          "name" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1809",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298067",
          "name" : "VDB-298067 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298067",
          "name" : "VDB-298067 | Pixsoft Sol Login Endpoint servlet sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.503275",
          "name" : "Submit #503275 | Pix Software Sol < 7.6.6 Time Based Blind SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Pixsoft Sol up to 7.6.6c and classified as critical. This issue affects some unknown processing of the file /pix_projetos/servlet?act=login&submit=1&evento=0&pixrnd=0125021816444195731041 of the component Login Endpoint. The manipulation of the argument txtUsuario leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T06:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1810",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1810",
          "name" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1810",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298068",
          "name" : "VDB-298068 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298068",
          "name" : "VDB-298068 | Pixsoft Vivaz Login Endpoint servlet cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.503323",
          "name" : "Submit #503323 | Pix Software Vivaz 6.0.11 Reflected Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Pixsoft Vivaz 6.0.11. It has been classified as problematic. Affected is an unknown function of the file /servlet?act=login&submit=1&evento=0&pixrnd=0125021817031859360231 of the component Login Endpoint. The manipulation of the argument sistema leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T07:15Z",
    "lastModifiedDate" : "2025-03-03T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1811",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yago3008/cves",
          "name" : "https://github.com/yago3008/cves",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1811",
          "name" : "https://github.com/yago3008/cves/tree/main/CVE-2025-1811",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298069",
          "name" : "VDB-298069 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298069",
          "name" : "VDB-298069 | AT Software Solutions ATSVD Login Endpoint login.aspx sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.504099",
          "name" : "Submit #504099 | AT Software Solutions ATSVD < 3.4.2 Blind Boolean-Based SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in AT Software Solutions ATSVD up to 3.4.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.aspx of the component Login Endpoint. The manipulation of the argument txtUsuario leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 3.4.2 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T09:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1812",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/A7cc/cve/issues/3",
          "name" : "https://github.com/A7cc/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/A7cc/cve/issues/3",
          "name" : "https://github.com/A7cc/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298080",
          "name" : "VDB-298080 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298080",
          "name" : "VDB-298080 | zj1983 zz SuperZ.java GetUserOrg sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504273",
          "name" : "Submit #504273 | zz 2024-08 sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in zj1983 zz up to 2024-08. Affected is the function GetUserOrg of the file com/futvan/z/framework/core/SuperZ.java. The manipulation of the argument userId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T09:15Z",
    "lastModifiedDate" : "2025-06-05T19:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1813",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298081",
          "name" : "VDB-298081 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298081",
          "name" : "VDB-298081 | zj1983 zz cross-site request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504281",
          "name" : "Submit #504281 | https://gitee.com/zj1983/zz zz_erp <=2024-8 CSRF",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/icmicuv9nkkvixb4?singleDoc#%20%E3%80%8AZZ_CSRF%E3%80%8B",
          "name" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/icmicuv9nkkvixb4?singleDoc#%20%E3%80%8AZZ_CSRF%E3%80%8B",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/icmicuv9nkkvixb4?singleDoc#%20%E3%80%8AZZ_CSRF%E3%80%8B",
          "name" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/icmicuv9nkkvixb4?singleDoc#%20%E3%80%8AZZ_CSRF%E3%80%8B",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in zj1983 zz up to 2024-08. Affected by this vulnerability is an unknown functionality. The manipulation leads to cross-site request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-02T10:15Z",
    "lastModifiedDate" : "2025-05-28T20:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1814",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Raining-101/IOT_cve/blob/main/ac6.md_goform_WifiExtraSet.md",
          "name" : "https://github.com/Raining-101/IOT_cve/blob/main/ac6.md_goform_WifiExtraSet.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298082",
          "name" : "VDB-298082 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298082",
          "name" : "VDB-298082 | Tenda AC6 WifiExtraSet stack-based overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506532",
          "name" : "Submit #506532 | Tenda AC6 V15.03.05.16 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Tenda AC6 15.03.05.16. Affected by this issue is some unknown functionality of the file /goform/WifiExtraSet. The manipulation of the argument wpapsk_crypto leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac6_firmware:15.03.05.16:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac6:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T11:15Z",
    "lastModifiedDate" : "2025-03-05T21:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1815",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/A7cc/cve/issues/4",
          "name" : "https://github.com/A7cc/cve/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/A7cc/cve/issues/4",
          "name" : "https://github.com/A7cc/cve/issues/4",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/A7cc/cve/issues/4#issue-2877111776",
          "name" : "https://github.com/A7cc/cve/issues/4#issue-2877111776",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298083",
          "name" : "VDB-298083 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298083",
          "name" : "VDB-298083 | pbrong hrms resource.go HrmsDB improper authorization",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.506544",
          "name" : "Submit #506544 | https://github.com/pbrong/hrms hrms 1.0.1 Unauthorized bypass access",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in pbrong hrms up to 1.0.1. This affects the function HrmsDB of the file \\resource\\resource.go. The manipulation of the argument user_cookie leads to improper authorization. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T12:15Z",
    "lastModifiedDate" : "2025-03-03T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1816",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://ffmpeg.org/",
          "name" : "https://ffmpeg.org/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/0526535cd58444dd264e810b2f3348b4d96cff3b",
          "name" : "https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/0526535cd58444dd264e810b2f3348b4d96cff3b",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://trac.ffmpeg.org/attachment/ticket/11475/poc",
          "name" : "https://trac.ffmpeg.org/attachment/ticket/11475/poc",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://trac.ffmpeg.org/ticket/11475",
          "name" : "https://trac.ffmpeg.org/ticket/11475",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://trac.ffmpeg.org/ticket/11475",
          "name" : "https://trac.ffmpeg.org/ticket/11475",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298089",
          "name" : "VDB-298089 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298089",
          "name" : "VDB-298089 | FFmpeg IAMF File iamf_parse.c audio_element_obu memory leak",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.506575",
          "name" : "Submit #506575 | FFmpeg git master Memory Leak",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic has been found in FFmpeg up to 6e26f57f672b05e7b8b052007a83aef99dc81ccb. This affects the function audio_element_obu of the file libavformat/iamf_parse.c of the component IAMF File Handler. The manipulation of the argument num_parameters leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of the patch is 0526535cd58444dd264e810b2f3348b4d96cff3b. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T14:15Z",
    "lastModifiedDate" : "2025-03-03T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1817",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/XSS.md",
          "name" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/XSS.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/XSS.md",
          "name" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/XSS.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298090",
          "name" : "VDB-298090 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298090",
          "name" : "VDB-298090 | Mini-Tmall Admin Name admin cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.504302",
          "name" : "Submit #504302 | n/a Mini-Tmall affected at 20250211 XSS",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Mini-Tmall up to 20250211. This vulnerability affects unknown code of the file /admin of the component Admin Name Handler. The manipulation leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T15:15Z",
    "lastModifiedDate" : "2025-03-03T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1818",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298091",
          "name" : "VDB-298091 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Exploit", "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298091",
          "name" : "VDB-298091 | zj1983 zz ZfileAction.upload unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504304",
          "name" : "Submit #504304 | zz_erp https://gitee.com/zj1983/zz <=2024-8 Any file upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/bg2g3eit41o4cpd4",
          "name" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/bg2g3eit41o4cpd4",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/bg2g3eit41o4cpd4#",
          "name" : "https://www.yuque.com/u123456789-6sobi/cdgcbq/bg2g3eit41o4cpd4#",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in zj1983 zz up to 2024-8. This issue affects some unknown processing of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.upload. The manipulation of the argument file leads to unrestricted upload. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T16:15Z",
    "lastModifiedDate" : "2025-05-26T01:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1819",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-78"
          }, {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Raining-101/IOT_cve/blob/main/Tenda%20a7%20V15.03.06.44%20Command%20injection.md",
          "name" : "https://github.com/Raining-101/IOT_cve/blob/main/Tenda%20a7%20V15.03.06.44%20Command%20injection.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298092",
          "name" : "VDB-298092 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298092",
          "name" : "VDB-298092 | Tenda AC7 1200M telnet TendaTelnet os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504429",
          "name" : "Submit #504429 | Tenda AC7 1200M large household 11ac dual-band wireless router V15.03.06.44 Command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Tenda AC7 1200M 15.03.06.44. Affected is the function TendaTelnet of the file /goform/telnet. The manipulation of the argument lan_ip leads to os command injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac7_firmware:15.03.06.44:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T17:15Z",
    "lastModifiedDate" : "2025-07-16T14:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1820",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_SQL%E6%B3%A8%E5%85%A51.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298093",
          "name" : "VDB-298093 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298093",
          "name" : "VDB-298093 | zj1983 zz ZworkflowAction.java getOaWid sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504478",
          "name" : "Submit #504478 | https://gitee.com/zj1983/zz zz 2024-8 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in zj1983 zz up to 2024-8 and classified as critical. Affected by this vulnerability is the function getOaWid of the file src/main/java/com/futvan/z/system/zworkflow/ZworkflowAction.java. The manipulation of the argument tableId leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T17:15Z",
    "lastModifiedDate" : "2025-05-26T01:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1821",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298094",
          "name" : "VDB-298094 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298094",
          "name" : "VDB-298094 | zj1983 zz ZorgAction.java getUserOrgForUserId sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504537",
          "name" : "Submit #504537 | https://gitee.com/zj1983/zz zz 2024-8 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in zj1983 zz up to 2024-8 and classified as critical. Affected by this issue is the function getUserOrgForUserId of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument userID leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T19:15Z",
    "lastModifiedDate" : "2025-05-26T01:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1828",
        "ASSIGNER" : "cve-request@security.metacpan.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/perl-Crypt-OpenPGP/Crypt-Random/commit/1f8b29e9e89d8d083fd025152e76ec918136cc05",
          "name" : "https://github.com/perl-Crypt-OpenPGP/Crypt-Random/commit/1f8b29e9e89d8d083fd025152e76ec918136cc05",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/perl-Crypt-OpenPGP/Crypt-Random/pull/1",
          "name" : "https://github.com/perl-Crypt-OpenPGP/Crypt-Random/pull/1",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Patch" ]
        }, {
          "url" : "https://perldoc.perl.org/functions/rand",
          "name" : "https://perldoc.perl.org/functions/rand",
          "refsource" : "",
          "tags" : [ "Patch" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Crypt::Random Perl package 1.05 through 1.55 may use rand() function, which is not cryptographically strong, for cryptographic functions.\n\nIf the Provider is not specified and /dev/urandom or an Entropy Gathering Daemon (egd) service is not available Crypt::Random will default to use the insecure Crypt::Random::rand provider.\n\nIn particular, Windows versions of perl will encounter this issue by default."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:timlegge:crypt\\:\\:random:*:*:*:*:*:perl:*:*",
          "versionStartIncluding" : "1.05",
          "versionEndIncluding" : "1.55",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T00:15Z",
    "lastModifiedDate" : "2025-06-27T16:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1829",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sjwszt/CVE/blob/main/CVE_2.md",
          "name" : "https://github.com/sjwszt/CVE/blob/main/CVE_2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/sjwszt/CVE/blob/main/CVE_2.md",
          "name" : "https://github.com/sjwszt/CVE/blob/main/CVE_2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298096",
          "name" : "VDB-298096 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298096",
          "name" : "VDB-298096 | TOTOLINK X18 cstecgi.cgi setMtknatCfg os command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504983",
          "name" : "Submit #504983 | TOTOLINK X18 Wireless Device V9.1.0cu.2024_B20220329 Remote Code Execution (RCE)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in TOTOLINK X18 9.1.0cu.2024_B20220329. It has been declared as critical. This vulnerability affects the function setMtknatCfg of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument mtkhnatEnable leads to os command injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:x18_firmware:9.1.0cu.2024_b20220329:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:x18:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T19:15Z",
    "lastModifiedDate" : "2025-04-03T15:35Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1830",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_xss1.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_xss1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_xss1.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_xss1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298097",
          "name" : "VDB-298097 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298097",
          "name" : "VDB-298097 | zj1983 zz Customer Information cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504790",
          "name" : "Submit #504790 | https://gitee.com/zj1983/zz zz 2024_8 Stored XSS",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as problematic. This issue affects some unknown processing of the component Customer Information Handler. The manipulation of the argument Customer Name leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-02T20:15Z",
    "lastModifiedDate" : "2025-05-26T00:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1831",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A52.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A52.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A52.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%89%8D%E5%8F%B0SQL%E6%B3%A8%E5%85%A52.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298098",
          "name" : "VDB-298098 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298098",
          "name" : "VDB-298098 | zj1983 zz ZorgAction.java GetDBUser sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504806",
          "name" : "Submit #504806 | https://gitee.com/zj1983/zz zz 2024_8 Front-end SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is the function GetDBUser of the file src/main/java/com/futvan/z/system/zorg/ZorgAction.java. The manipulation of the argument user_id leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T20:15Z",
    "lastModifiedDate" : "2025-05-26T00:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1832",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_4%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_4%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_4%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8_4%E5%90%8E%E5%8F%B0SQL%E6%B3%A8%E5%85%A5.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298099",
          "name" : "VDB-298099 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298099",
          "name" : "VDB-298099 | zj1983 zz ZroleAction.java getUserList sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504814",
          "name" : "Submit #504814 | https://gitee.com/zj1983/zz zz 2024_8 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is the function getUserList of the file src/main/java/com/futvan/z/system/zrole/ZroleAction.java. The manipulation of the argument roleid leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T21:15Z",
    "lastModifiedDate" : "2025-05-26T00:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1833",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E5%90%8E%E5%8F%B0SSRF.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E5%90%8E%E5%8F%B0SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E5%90%8E%E5%8F%B0SSRF.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E5%90%8E%E5%8F%B0SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298100",
          "name" : "VDB-298100 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298100",
          "name" : "VDB-298100 | zj1983 zz HTTP Request Customer_noticeAction.java sendNotice server-side request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504833",
          "name" : "Submit #504833 | https://gitee.com/zj1983/zz zz 2024_8 Server-Side Request Forgery (SSRF)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in zj1983 zz up to 2024-8. Affected by this issue is the function sendNotice of the file src/main/java/com/futvan/z/erp/customer_notice/Customer_noticeAction.java of the component HTTP Request Handler. The manipulation of the argument url leads to server-side request forgery. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T22:15Z",
    "lastModifiedDate" : "2025-05-26T00:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1834",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_resolve%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_resolve%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_resolve%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_resolve%E6%8E%A5%E5%8F%A3%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298101",
          "name" : "VDB-298101 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298101",
          "name" : "VDB-298101 | zj1983 zz resolve unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504842",
          "name" : "Submit #504842 | https://gitee.com/zj1983/zz zz <=2024-8 Any file upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in zj1983 zz up to 2024-8. This affects an unknown part of the file /resolve. The manipulation of the argument file leads to unrestricted upload. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-02T22:15Z",
    "lastModifiedDate" : "2025-05-26T00:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1835",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sheratan4/cve/issues/1",
          "name" : "https://github.com/sheratan4/cve/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/sheratan4/cve/issues/1",
          "name" : "https://github.com/sheratan4/cve/issues/1",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298102",
          "name" : "VDB-298102 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298102",
          "name" : "VDB-298102 | osuuu LightPicture Api.php upload unrestricted upload",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.505007",
          "name" : "Submit #505007 | https://github.com/osuuu/LightPicture LightPicture  1.2.2 unauthorized file upload",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in osuuu LightPicture 1.2.2 and classified as critical. This vulnerability affects the function upload of the file /app/controller/Api.php. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-02T23:15Z",
    "lastModifiedDate" : "2025-03-03T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1836",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-74"
          }, {
            "lang" : "en",
            "value" : "CWE-1236"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298104",
          "name" : "VDB-298104 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298104",
          "name" : "VDB-298104 | Incorta Edit Insight csv injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.503070",
          "name" : "Submit #503070 | Incorta 2023.4.3 CSV Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Incorta 2023.4.3. It has been classified as problematic. Affected is an unknown function of the component Edit Insight Handler. The manipulation of the argument Service Name leads to csv injection. It is possible to launch the attack remotely. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-02T23:15Z",
    "lastModifiedDate" : "2025-03-02T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1838",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-602"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232429",
          "name" : "https://www.ibm.com/support/pages/node/7232429",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Cloud Pak for Business Automation\n\n 24.0.0 and 24.0.1 through 24.0.1 IF001 \n\nAuthoring allows an authenticated user to bypass client-side data validation in an authoring user interface which could cause a denial of service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_002:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_003:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:interim_fix_004:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:cloud_pak_for_business_automation:24.0.1:interim_fix_001:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-03T19:15Z",
    "lastModifiedDate" : "2025-08-14T01:53Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1840",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/dXBkYXRlb3JnLmpzcA%3D%3D.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298106",
          "name" : "VDB-298106 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298106",
          "name" : "VDB-298106 | ESAFENET CDG updateorg.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504384",
          "name" : "Submit #504384 | esafenet CDG V5.6.3.154.205_20250114 RCE",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in ESAFENET CDG 5.6.3.154.205. It has been rated as critical. Affected by this issue is some unknown functionality of the file /CDGServer3/workflowE/useractivate/updateorg.jsp. The manipulation of the argument flowId leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5.6.3.154.205:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T00:15Z",
    "lastModifiedDate" : "2025-06-05T19:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1841",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/Q2xpZW50U29ydExvZy5qc3A%3D.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/Q2xpZW50U29ydExvZy5qc3A%3D.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Rain1er/report/blob/main/CDG/Q2xpZW50U29ydExvZy5qc3A%3D.md",
          "name" : "https://github.com/Rain1er/report/blob/main/CDG/Q2xpZW50U29ydExvZy5qc3A%3D.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298107",
          "name" : "VDB-298107 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298107",
          "name" : "VDB-298107 | ESAFENET CDG ClientSortLog.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.504385",
          "name" : "Submit #504385 | esafenet CDG V5.6.3.154.205_20250114 RCE",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in ESAFENET CDG 5.6.3.154.205. This affects an unknown part of the file /CDGServer3/logManagement/ClientSortLog.jsp. The manipulation of the argument startDate/endDate leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5.6.3.154.205:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T00:15Z",
    "lastModifiedDate" : "2025-05-28T17:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1842",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298108",
          "name" : "VDB-298108 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298108",
          "name" : "VDB-298108 | FITSTATS Technologies AthleteMonitoring login.php cross site scripting",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.504603",
          "name" : "Submit #504603 | FITSTATS Technologies AthleteMonitoring N/A Cross Site Scripting",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in FITSTATS Technologies AthleteMonitoring up to 20250302. This vulnerability affects unknown code of the file /login.php. The manipulation of the argument username leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-03T01:15Z",
    "lastModifiedDate" : "2025-03-03T01:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1843",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/SQL%20injection.md",
          "name" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/SQL%20injection.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/SQL%20injection.md",
          "name" : "https://github.com/qkdjksfkeg/cve_article/blob/main/Tmall_demo/SQL%20injection.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298109",
          "name" : "VDB-298109 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298109",
          "name" : "VDB-298109 | Mini-Tmall ProductMapper.java select sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.504958",
          "name" : "Submit #504958 | n/a Mini-Tmall 2025/02/11 latest SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Mini-Tmall up to 20250211. This issue affects the function select of the file com/xq/tmall/dao/ProductMapper.java. The manipulation of the argument orderBy leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T01:15Z",
    "lastModifiedDate" : "2025-03-03T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1844",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/666lail/report/blob/main/tmp/1.md",
          "name" : "https://github.com/666lail/report/blob/main/tmp/1.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/666lail/report/blob/main/tmp/1.md",
          "name" : "https://github.com/666lail/report/blob/main/tmp/1.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298110",
          "name" : "VDB-298110 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298110",
          "name" : "VDB-298110 | ESAFENET CDG backupLogDetail.jsp sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505008",
          "name" : "Submit #505008 | esafenet CDG V5.6.3.154.205_20250114 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in ESAFENET CDG 5.6.3.154.205_20250114. Affected is an unknown function of the file /CDGServer3/logManagement/backupLogDetail.jsp. The manipulation of the argument logTaskId leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:cdg:5.6.3.154.205_20250114:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T02:15Z",
    "lastModifiedDate" : "2025-05-28T17:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1845",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/666lail/report/blob/main/tmp/2.md",
          "name" : "https://github.com/666lail/report/blob/main/tmp/2.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/666lail/report/blob/main/tmp/2.md",
          "name" : "https://github.com/666lail/report/blob/main/tmp/2.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298111",
          "name" : "VDB-298111 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298111",
          "name" : "VDB-298111 | ESAFENET DSM examExportPDF command injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505009",
          "name" : "Submit #505009 | esafenet DSM v3.1.2 Command Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in ESAFENET DSM 3.1.2 and classified as critical. Affected by this vulnerability is the function examExportPDF of the file /admin/plan/examExportPDF. The manipulation of the argument s leads to command injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esafenet:dsm:3.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T02:15Z",
    "lastModifiedDate" : "2025-05-28T17:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1846",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_2024_8%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E5%88%A0%E9%99%A4.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298114",
          "name" : "VDB-298114 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298114",
          "name" : "VDB-298114 | zj1983 zz File ZfileAction.java deleteLocalFile denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505097",
          "name" : "Submit #505097 | https://gitee.com/zj1983/zz zz 2024-8 Arbitrary File Deletion",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in zj1983 zz up to 2024-8. It has been declared as problematic. This vulnerability affects the function deleteLocalFile of the file src/main/java/com/futvan/z/system/zfile/ZfileAction.java of the component File Handler. The manipulation of the argument zids leads to denial of service. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-03T03:15Z",
    "lastModifiedDate" : "2025-05-28T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1847",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/ZZ_2024_8%E5%9E%82%E7%9B%B4%E8%B6%8A%E6%9D%83.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298115",
          "name" : "VDB-298115 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298115",
          "name" : "VDB-298115 | zj1983 zz improper authorization",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505303",
          "name" : "Submit #505303 | https://gitee.com/zj1983/zz zz 2024-8 Improper Privilege Management",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in zj1983 zz up to 2024-8. It has been rated as critical. This issue affects some unknown processing. The manipulation leads to improper authorization. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T03:15Z",
    "lastModifiedDate" : "2025-05-26T01:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1848",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_check_SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298116",
          "name" : "VDB-298116 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298116",
          "name" : "VDB-298116 | zj1983 zz import_data_check server-side request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505345",
          "name" : "Submit #505345 | https://gitee.com/zj1983/zz zz <=2024-8 SSRF",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in zj1983 zz up to 2024-8. Affected is an unknown function of the file /import_data_check. The manipulation of the argument url leads to server-side request forgery. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T04:15Z",
    "lastModifiedDate" : "2025-05-26T02:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1849",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/zz/zz_import_data_todb_SSRF.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298117",
          "name" : "VDB-298117 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298117",
          "name" : "VDB-298117 | zj1983 zz import_data_todb server-side request forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505346",
          "name" : "Submit #505346 | https://gitee.com/zj1983/zz zz <=2024-8 SSRF",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in zj1983 zz up to 2024-8. Affected by this vulnerability is an unknown functionality of the file /import_data_todb. The manipulation of the argument url leads to server-side request forgery. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zframeworks:zz:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024-8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T04:15Z",
    "lastModifiedDate" : "2025-05-26T02:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1850",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md",
          "name" : "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md",
          "name" : "https://github.com/WHOAMI-xiaoyu/CVE/blob/main/CVE_2.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298118",
          "name" : "VDB-298118 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298118",
          "name" : "VDB-298118 | Codezips College Management System university.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.511626",
          "name" : "Submit #511626 | Codezips College Management System In PHP With Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Codezips College Management System 1.0. Affected by this issue is some unknown functionality of the file /university.php. The manipulation of the argument book_name leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:college_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T05:15Z",
    "lastModifiedDate" : "2025-04-04T15:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1851",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
          "name" : "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
          "name" : "https://github.com/Raining-101/IOT_cve/blob/main/ac7_V15.03.06.44_SetFirewallCfg.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298119",
          "name" : "VDB-298119 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298119",
          "name" : "VDB-298119 | Tenda AC7 SetFirewallCfg formSetFirewallCfg stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505271",
          "name" : "Submit #505271 | Tenda ac7 V15.03.06.44 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Tenda AC7 up to 15.03.06.44. This affects the function formSetFirewallCfg of the file /goform/SetFirewallCfg. The manipulation of the argument firewallEn leads to stack-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac7_firmware:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "15.03.06.44",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac7:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T05:15Z",
    "lastModifiedDate" : "2025-04-10T13:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1852",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md",
          "name" : "https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md",
          "name" : "https://github.com/watermelon-happy/cve/blob/main/ex1800tCVE.md",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298120",
          "name" : "VDB-298120 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298120",
          "name" : "VDB-298120 | Totolink EX1800T cstecgi.cgi loginAuth buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505362",
          "name" : "Submit #505362 | totolink EX1800T V9.1.0cu.2112_B20220316 buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.totolink.net/",
          "name" : "https://www.totolink.net/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Totolink EX1800T 9.1.0cu.2112_B20220316 and classified as critical. This vulnerability affects the function loginAuth of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument password leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:totolink:ex1800t_firmware:9.1.0cu.2112_b20220316:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:totolink:ex1800t:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T06:15Z",
    "lastModifiedDate" : "2025-04-03T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1853",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-121"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_sub_49E098.md",
          "name" : "https://github.com/Raining-101/IOT_cve/blob/main/tenda-ac8_sub_49E098.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298121",
          "name" : "VDB-298121 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298121",
          "name" : "VDB-298121 | Tenda AC8 Parameter SetIpMacBind sub_49E098 stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.505374",
          "name" : "Submit #505374 | Tenda ac8 V16.03.34.06 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Tenda AC8 16.03.34.06 and classified as critical. This issue affects the function sub_49E098 of the file /goform/SetIpMacBind of the component Parameter Handler. The manipulation of the argument list leads to stack-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:ac8_firmware:16.03.34.06:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:ac8:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T06:15Z",
    "lastModifiedDate" : "2025-03-03T06:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1854",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/yhj09/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/yhj09/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298122",
          "name" : "VDB-298122 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298122",
          "name" : "VDB-298122 | Codezips Gym Management System del_member.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506053",
          "name" : "Submit #506053 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0. It has been classified as critical. Affected is an unknown function of the file /dashboard/admin/del_member.php. The manipulation of the argument name leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T07:15Z",
    "lastModifiedDate" : "2025-06-24T14:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1855",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/panghuanjie/Code-audits/blob/main/PHPGurukul/PHPGurukul%20Online%20Shopping%20Portal%20v2.1%20SQL%20Injection3%20.pdf",
          "name" : "https://github.com/panghuanjie/Code-audits/blob/main/PHPGurukul/PHPGurukul%20Online%20Shopping%20Portal%20v2.1%20SQL%20Injection3%20.pdf",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298123",
          "name" : "VDB-298123 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298123",
          "name" : "VDB-298123 | PHPGurukul Online Shopping Portal product-details.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506066",
          "name" : "Submit #506066 | PHPGurukul Online Shopping Portal Project V2.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Online Shopping Portal 2.1. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /product-details.php. The manipulation of the argument quality/price/value/name/summary/review leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:online_shopping_portal:2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T07:15Z",
    "lastModifiedDate" : "2025-06-24T15:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1856",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/smartttt1/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/smartttt1/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298124",
          "name" : "VDB-298124 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298124",
          "name" : "VDB-298124 | Codezips Gym Management System gen_invoice.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506107",
          "name" : "Submit #506107 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Gym Management System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /dashboard/admin/gen_invoice.php. The manipulation of the argument id leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T08:15Z",
    "lastModifiedDate" : "2025-06-24T14:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1857",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/panghuanjie/Code-audits/issues/1",
          "name" : "https://github.com/panghuanjie/Code-audits/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298125",
          "name" : "VDB-298125 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298125",
          "name" : "VDB-298125 | PHPGurukul Nipah Virus Testing Management System check_availability.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506120",
          "name" : "Submit #506120 | PHPGurukul Nipah Virus Testing Management System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in PHPGurukul Nipah Virus Testing Management System 1.0. This affects an unknown part of the file /check_availability.php. The manipulation of the argument employeeid leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:nipah_virus_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T08:15Z",
    "lastModifiedDate" : "2025-06-24T15:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1858",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Centurion-cyber/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/Centurion-cyber/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298126",
          "name" : "VDB-298126 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298126",
          "name" : "VDB-298126 | Codezips Online Shopping Website success.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506315",
          "name" : "Submit #506315 | Codezips Online Shopping Website In PHP With Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Codezips Online Shopping Website 1.0. This vulnerability affects unknown code of the file /success.php. The manipulation of the argument id leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:online_shopping_website:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T09:15Z",
    "lastModifiedDate" : "2025-06-24T14:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1859",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/panghuanjie/Code-audits/issues/2",
          "name" : "https://github.com/panghuanjie/Code-audits/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298127",
          "name" : "VDB-298127 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298127",
          "name" : "VDB-298127 | PHPGurukul News Portal login.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506350",
          "name" : "Submit #506350 | PHPGurukul News Portal V4.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in PHPGurukul News Portal 4.1. This issue affects some unknown processing of the file /login.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:news_portal:4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T09:15Z",
    "lastModifiedDate" : "2025-03-07T14:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1860",
        "ASSIGNER" : "cve-request@security.metacpan.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://lists.debian.org/debian-lts-announce/2025/03/msg00026.html",
          "name" : "https://lists.debian.org/debian-lts-announce/2025/03/msg00026.html",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://metacpan.org/release/ZEFRAM/Data-Entropy-0.007/source/lib/Data/Entropy.pm#L80",
          "name" : "https://metacpan.org/release/ZEFRAM/Data-Entropy-0.007/source/lib/Data/Entropy.pm#L80",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://perldoc.perl.org/functions/rand",
          "name" : "https://perldoc.perl.org/functions/rand",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Data::Entropy for Perl 0.007 and earlier use the rand() function as the default source of entropy, which is not cryptographically secure, for cryptographic functions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-28T01:15Z",
    "lastModifiedDate" : "2025-05-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1861",
        "ASSIGNER" : "security@php.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff",
          "name" : "https://github.com/php/php-src/security/advisories/GHSA-52jp-hrpf-2jff",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://security.netapp.com/advisory/ntap-20250523-0005/",
          "name" : "https://security.netapp.com/advisory/ntap-20250523-0005/",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In PHP from 8.1.* before 8.1.32, from 8.2.* before 8.2.28, from 8.3.* before 8.3.19, from 8.4.* before 8.4.5, when parsing HTTP redirect in the response to an HTTP request, there is currently limit on the location value size caused by limited size of the location buffer to 1024. However as per RFC9110, the limit is recommended to be 8000. This may lead to incorrect URL truncation and redirecting to a wrong location."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.3.0",
          "versionEndExcluding" : "8.3.14",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.2.0",
          "versionEndExcluding" : "8.2.26",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndExcluding" : "8.1.31",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:php:php:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.4.0",
          "versionEndExcluding" : "8.4.5",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:netapp:ontap:9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-30T06:15Z",
    "lastModifiedDate" : "2025-07-02T20:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1863",
        "ASSIGNER" : "cve@yokogawaGroup.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://web-material3.yokogawa.com/1/36974/files/YSAR-25-0001-E.pdf",
          "name" : "https://web-material3.yokogawa.com/1/36974/files/YSAR-25-0001-E.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insecure default settings have been found in recorder products provided by Yokogawa Electric Corporation. The default setting of the authentication function is disabled on the affected products. Therefore, when connected to a network with default settings, anyone can access all functions related to settings and operations. As a result, an attacker can illegally manipulate and configure important data such as measured values and settings.\nThis issue affects GX10 / GX20 / GP10 / GP20 Paperless Recorders: R5.04.01 or earlier; GM Data Acquisition System: R5.05.01 or earlier; DX1000 / DX2000 / DX1000N Paperless Recorders: R4.21 or earlier; FX1000 Paperless Recorders: R1.31 or earlier; µR10000 / µR20000 Chart Recorders: R1.51 or earlier; MW100 Data Acquisition Units: All versions; DX1000T / DX2000T Paperless Recorders: All versions; CX1000 / CX2000 Paperless Recorders: All versions."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-18T06:15Z",
    "lastModifiedDate" : "2025-04-21T14:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1864",
        "ASSIGNER" : "cve_disclosure@tech.gov.sg"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/radareorg/radare2/pull/23981",
          "name" : "https://github.com/radareorg/radare2/pull/23981",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in radareorg radare2 allows Overflow Buffers.This issue affects radare2: before <5.9.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:radare:radare2:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "5.9.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T09:15Z",
    "lastModifiedDate" : "2025-07-01T14:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1865",
        "ASSIGNER" : "cve-request@cirosec.de"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://neodyme.io/de/advisories/cve-2025-1865/",
          "name" : "https://neodyme.io/de/advisories/cve-2025-1865/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.elby.ch/de/products/vcd.html",
          "name" : "https://www.elby.ch/de/products/vcd.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The kernel driver, accessible to low-privileged users, exposes a function that fails to properly validate the privileges of the calling process. This allows creating files at arbitrary locations with full user control, ultimately allowing for privilege escalation to SYSTEM."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-04T10:15Z",
    "lastModifiedDate" : "2025-07-07T21:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1866",
        "ASSIGNER" : "cve_disclosure@tech.gov.sg"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/warmcat/libwebsockets/commit/3f7c79fd57338aca1bf4a1b1f24e324b80d36265",
          "name" : "https://github.com/warmcat/libwebsockets/commit/3f7c79fd57338aca1bf4a1b1f24e324b80d36265",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in warmcat libwebsockets allows Pointer Manipulation, potentially leading to out-of-bounds memory access. This issue affects libwebsockets before 4.3.4 and is present in code built specifically for the Win32 platform.\n\nBy default, the affected code is not executed unless one of the following conditions is met:\n\nLWS_WITHOUT_EXTENSIONS (default ON) is manually set to OFF in CMake.\nLWS_WITH_HTTP_STREAM_COMPRESSION (default OFF) is manually set to ON in CMake.\nDespite these conditions, when triggered in affected configurations, this vulnerability may allow attackers to manipulate pointers, potentially leading to memory corruption or unexpected behavior."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T09:15Z",
    "lastModifiedDate" : "2025-03-03T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1867",
        "ASSIGNER" : "cve_disclosure@tech.gov.sg"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ithewei/libhv/pull/689",
          "name" : "https://github.com/ithewei/libhv/pull/689",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling') vulnerability in ithewei libhv allows HTTP Response Smuggling.This issue affects libhv: through 1.3.3."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T09:15Z",
    "lastModifiedDate" : "2025-03-03T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1868",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          }, {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/information-display-multiple-products-famatech-corp",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/information-display-multiple-products-famatech-corp",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Vulnerability of unauthorized exposure of confidential information affecting Advanced IP Scanner and Advanced Port Scanner. It occurs when these applications initiate a network scan, inadvertently sending the NTLM hash of the user performing the scan. This vulnerability can be exploited by intercepting network traffic to a legitimate server or by setting up a fake server, in both local and remote scenarios. This exposure is relevant for both HTTP/HTTPS and SMB protocols."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-03T11:15Z",
    "lastModifiedDate" : "2025-03-03T12:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1869",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"username\" parameter in admin/check_avalability.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1870",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"pagedescription\" parameter in admin/aboutus.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1871",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"category\" and \"subcategory\" parameters in admin/add-subcategory.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1872",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"sadminusername\" parameter in admin/add-subadmins.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1873",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"pagetitle\" and \"pagedescription\" parameters in admin/contactus.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1874",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"description\" parameter in admin/add-category.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1875",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-101news",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SQL injection vulnerability have been found in 101news affecting version 1.0 through the \"searchtitle\" parameter in search.php."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_online_news_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T13:15Z",
    "lastModifiedDate" : "2025-03-07T14:45Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1876",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-787"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298190",
          "name" : "VDB-298190 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298190",
          "name" : "VDB-298190 | D-Link DAP-1562 HTTP Header http_request_parse stack-based overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506106",
          "name" : "Submit #506106 | D-Link DAP-1562 1.10 Buffer Overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7",
          "name" : "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7",
          "name" : "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-http_request_parse-Vulnerability-1a4b2f2a636180a2a67de271ad5fe6d7",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in D-Link DAP-1562 1.10. Affected by this issue is the function http_request_parse of the component HTTP Header Handler. The manipulation of the argument Authorization leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dap-1562_firmware:1.10:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dap-1562:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T17:15Z",
    "lastModifiedDate" : "2025-05-21T16:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1877",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          }, {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://vuldb.com/?ctiid.298191",
          "name" : "VDB-298191 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298191",
          "name" : "VDB-298191 | D-Link DAP-1562 HTTP POST Request pure_auth_check null pointer dereference",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506526",
          "name" : "Submit #506526 | D-Link DAP-1562 1.10 NULL Pointer Dereference",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-pure_auth_check-Vulnerability-1a5b2f2a63618013a1fecb743f2d0667",
          "name" : "https://witty-maiasaura-083.notion.site/D-link-DAP-1562-pure_auth_check-Vulnerability-1a5b2f2a63618013a1fecb743f2d0667",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://www.dlink.com/",
          "name" : "https://www.dlink.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in D-Link DAP-1562 1.10. This affects the function pure_auth_check of the component HTTP POST Request Handler. The manipulation of the argument a1 leads to null pointer dereference. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. This vulnerability only affects products that are no longer supported by the maintainer."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:dlink:dap-1562_firmware:1.10:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:dlink:dap-1562:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-03T19:15Z",
    "lastModifiedDate" : "2025-03-06T12:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1878",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1393"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/geo-chen/i-Drive",
          "name" : "https://github.com/geo-chen/i-Drive",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298192",
          "name" : "VDB-298192 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298192",
          "name" : "VDB-298192 | i-Drive i11/i12 WiFi default password",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.510949",
          "name" : "Submit #510949 | i-DRIVE Dashcam i11, i12 Use of Default Credentials",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in i-Drive i11 and i12 up to 20250227 and classified as problematic. This vulnerability affects unknown code of the component WiFi. The manipulation leads to use of default password. Access to the local network is required for this attack to succeed. The complexity of an attack is rather high. The exploitation appears to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i11_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i11:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i12_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i12:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.1,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.6,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-03T19:15Z",
    "lastModifiedDate" : "2025-03-06T12:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1879",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-798"
          }, {
            "lang" : "en",
            "value" : "CWE-259"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/geo-chen/i-Drive",
          "name" : "https://github.com/geo-chen/i-Drive",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298193",
          "name" : "VDB-298193 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298193",
          "name" : "VDB-298193 | i-Drive i11/i12 APK hard-coded credentials",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.510950",
          "name" : "Submit #510950 | i-DRIVE Dashcam i11, i12 Plaintext Password in Configuration File",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in i-Drive i11 and i12 up to 20250227 and classified as problematic. This issue affects some unknown processing of the component APK. The manipulation leads to hard-coded credentials. It is possible to launch the attack on the physical device. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i11_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i11:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i12_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i12:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "PHYSICAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T20:15Z",
    "lastModifiedDate" : "2025-03-05T14:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1880",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          }, {
            "lang" : "en",
            "value" : "CWE-305"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/geo-chen/i-Drive",
          "name" : "https://github.com/geo-chen/i-Drive",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298194",
          "name" : "VDB-298194 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298194",
          "name" : "VDB-298194 | i-Drive i11/i12 Device Pairing authentication bypass",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.510951",
          "name" : "Submit #510951 | i-DRIVE Dashcam i11, i12 Authentication Bypass by Primary Weakness",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been classified as problematic. Affected is an unknown function of the component Device Pairing. The manipulation leads to authentication bypass by primary weakness. It is possible to launch the attack on the physical device. The complexity of an attack is rather high. The exploitability is told to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i11_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i11:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i12_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i12:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-03T20:15Z",
    "lastModifiedDate" : "2025-03-05T14:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1881",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-266"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/geo-chen/i-Drive",
          "name" : "https://github.com/geo-chen/i-Drive",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298195",
          "name" : "VDB-298195 | CTI Indicators (IOB, IOC, TTP)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298195",
          "name" : "VDB-298195 | i-Drive i11/i12 Video Footage/Live Video Stream access control",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.510952",
          "name" : "Submit #510952 | i-DRIVE Dashcam i11, i12 Improper Access Controls",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been declared as problematic. Affected by this vulnerability is an unknown functionality of the component Video Footage/Live Video Stream. The manipulation leads to improper access controls. The attack can be launched remotely. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i11_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i11:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i12_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i12:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-03T21:15Z",
    "lastModifiedDate" : "2025-03-05T14:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1882",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-1262"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/geo-chen/i-Drive",
          "name" : "https://github.com/geo-chen/i-Drive",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298196",
          "name" : "VDB-298196 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298196",
          "name" : "VDB-298196 | i-Drive i11/i12 Device Setting improper access control for register interface",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.510955",
          "name" : "Submit #510955 | i-DRIVE Dashcam i11, i12 Improper Access Control for Register Interface",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in i-Drive i11 and i12 up to 20250227. It has been rated as critical. Affected by this issue is some unknown functionality of the component Device Setting Handler. The manipulation leads to improper access control for register interface. The attack needs to be done within the local network. The complexity of an attack is rather high. The exploitation is known to be difficult. It was not possible to identify the current maintainer of the product. It must be assumed that the product is end-of-life."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i11_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i11:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:i-drive:i12_firmware:*:*:*:*:*:*:*:*",
            "versionEndIncluding" : "20250227",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:i-drive:i12:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.0,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.0,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T21:15Z",
    "lastModifiedDate" : "2025-03-05T14:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1883",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-Of-Bounds Write vulnerability exists in the OBJ file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted OBJÂ file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-02T15:15Z",
    "lastModifiedDate" : "2025-05-02T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1884",
        "ASSIGNER" : "3DS.Information-Security@3ds.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.3ds.com/vulnerability/advisories",
          "name" : "https://www.3ds.com/vulnerability/advisories",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use-After-Free vulnerability exists in the SLDPRT file reading procedure in SOLIDWORKS eDrawings on Release SOLIDWORKS Desktop 2025. This vulnerability could allow an attacker to execute arbitrary code while opening a specially crafted SLDPRT file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-02T15:15Z",
    "lastModifiedDate" : "2025-05-02T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1886",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-522"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sage-200-spain",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sage-200-spain",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Pass-Back vulnerability in versions prior to 2025.35.000 of Sage 200 Spain. This vulnerability allows an authenticated attacker with administrator privileges to discover stored SMTP credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-07T11:15Z",
    "lastModifiedDate" : "2025-03-07T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1887",
        "ASSIGNER" : "cve-coordination@incibe.es"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-294"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sage-200-spain",
          "name" : "https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-sage-200-spain",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "SMB forced authentication vulnerability in versions prior to 2025.35.000 of Sage 200 Spain. This vulnerability allows an authenticated attacker with administrator privileges to obtain NTLMv2-SSP Hash by changing any of the paths to a UNC path pointing to a server controlled by the attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-07T11:15Z",
    "lastModifiedDate" : "2025-03-07T11:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1888",
        "ASSIGNER" : "cves@blacklanternsecurity.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.blacklanternsecurity.com/p/cve-2025-1888reflected-xss-in-aperio",
          "name" : "https://blog.blacklanternsecurity.com/p/cve-2025-1888reflected-xss-in-aperio",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Leica Web Viewer within the Aperio Eslide Manager Application is vulnerable to reflected cross-site scripting (XSS). An authenticated user can access the slides within a project and injecting malicious JavaScript into the \"memo\" field. The memo field has a hover over action that will display a Microsoft Tool Tip which a user can use to quickly view the memo associated with the slide and execute the JavaScript."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-14T17:15Z",
    "lastModifiedDate" : "2025-03-14T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1889",
        "ASSIGNER" : "security@sonatype.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v",
          "name" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-655q-fx9r-782v",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit" ]
        }, {
          "url" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1889",
          "name" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1889",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "Exploit", "Mitigation" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "picklescan before 0.0.22 only considers standard pickle file extensions in the scope for its vulnerability scan. An attacker could craft a malicious model that uses Pickle and include a malicious pickle file with a non-standard file extension. Because the malicious pickle file inclusion is not considered as part of the scope of picklescan, the file would pass security checks and appear to be safe, when it could instead prove to be problematic."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.0.22",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-03T19:15Z",
    "lastModifiedDate" : "2025-03-05T20:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1890",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          }, {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E4%BB%BB%E6%84%8F%E6%96%87%E4%BB%B6%E4%B8%8A%E4%BC%A0.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298408",
          "name" : "VDB-298408 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298408",
          "name" : "VDB-298408 | shishuocms ManageUpLoadAction.java handleRequest unrestricted upload",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.505736",
          "name" : "Submit #505736 | https://gitee.com/shishuo/CMS_old shishuocms 1.1 Unrestricted Upload of File with Dangerous Type",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in shishuocms 1.1 and classified as critical. This vulnerability affects the function handleRequest of the file src/main/java/com/shishuo/cms/action/manage/ManageUpLoadAction.java. The manipulation of the argument file leads to unrestricted upload. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:shishuocms_project:shishuocms:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T00:15Z",
    "lastModifiedDate" : "2025-03-05T14:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1891",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          }, {
            "lang" : "en",
            "value" : "CWE-862"
          }, {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/CSRF%E6%B7%BB%E5%8A%A0%E7%AE%A1%E7%90%86%E5%91%98.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298409",
          "name" : "VDB-298409 | CTI Indicators (IOB, IOC)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298409",
          "name" : "VDB-298409 | shishuocms cross-site request forgery",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.505741",
          "name" : "Submit #505741 | https://gitee.com/shishuo/CMS_old shishuocms 1.1 Cross-Site Request Forgery",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in shishuocms 1.1 and classified as problematic. This issue affects some unknown processing. The manipulation leads to cross-site request forgery. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:qzw1210:shishuocms:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T00:15Z",
    "lastModifiedDate" : "2025-03-05T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1892",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md",
          "name" : "https://github.com/caigo8/CVE-md/blob/main/shishuocms/%E5%AD%98%E5%82%A8%E5%9E%8BXSS.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298410",
          "name" : "VDB-298410 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298410",
          "name" : "VDB-298410 | shishuocms Directory Deletion Page add.json cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.505754",
          "name" : "Submit #505754 | https://gitee.com/shishuo/CMS_old shishuocms 1.1 Cross-site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in shishuocms 1.1. It has been classified as problematic. Affected is an unknown function of the file /manage/folder/add.json of the component Directory Deletion Page. The manipulation of the argument folderName leads to cross site scripting. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:qzw1210:shishuocms:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T01:15Z",
    "lastModifiedDate" : "2025-03-05T20:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1893",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/open5gs/open5gs/commit/e31e9965f00d9c744a7f728497cb4f3e97744ee8",
          "name" : "https://github.com/open5gs/open5gs/commit/e31e9965f00d9c744a7f728497cb4f3e97744ee8",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3707",
          "name" : "https://github.com/open5gs/open5gs/issues/3707",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3707#issue-2833194192",
          "name" : "https://github.com/open5gs/open5gs/issues/3707#issue-2833194192",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3707#issue-2833194192",
          "name" : "https://github.com/open5gs/open5gs/issues/3707#issue-2833194192",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/issues/3707#issuecomment-2639620554",
          "name" : "https://github.com/open5gs/open5gs/issues/3707#issuecomment-2639620554",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298411",
          "name" : "VDB-298411 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298411",
          "name" : "VDB-298411 | Open5GS AMF gmm-sm.c gmm_state_authentication denial of service",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.505952",
          "name" : "Submit #505952 | Open5GS v2.7.2 Denial of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Open5GS up to 2.7.2. It has been declared as problematic. Affected by this vulnerability is the function gmm_state_authentication of the file src/amf/gmm-sm.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. The patch is named e31e9965f00d9c744a7f728497cb4f3e97744ee8. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.7.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T01:15Z",
    "lastModifiedDate" : "2025-03-06T12:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1894",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Maochuyue/cve/issues/1",
          "name" : "https://github.com/Maochuyue/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298412",
          "name" : "VDB-298412 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298412",
          "name" : "VDB-298412 | PHPGurukul Restaurant Table Booking System search-result.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506592",
          "name" : "Submit #506592 | PHPGurukul RTBS Project PHP V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been rated as critical. Affected by this issue is some unknown functionality of the file /search-result.php. The manipulation of the argument searchdata leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T02:15Z",
    "lastModifiedDate" : "2025-03-05T15:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1895",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_1.pdf",
          "name" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_1.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298413",
          "name" : "VDB-298413 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298413",
          "name" : "VDB-298413 | Tenda TX3 setMacFilterCfg buffer overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506601",
          "name" : "Submit #506601 | Tenda TX3 V16.03.13.11_multi buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in Tenda TX3 16.03.13.11_multi. This affects an unknown part of the file /goform/setMacFilterCfg. The manipulation of the argument deviceList leads to buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T02:15Z",
    "lastModifiedDate" : "2025-03-05T15:18Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1896",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_2.pdf",
          "name" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_2.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298414",
          "name" : "VDB-298414 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298414",
          "name" : "VDB-298414 | Tenda TX3 SetStaticRouteCfg buffer overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506602",
          "name" : "Submit #506602 | Tenda TX3 V16.03.13.11_multi buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in Tenda TX3 16.03.13.11_multi. This vulnerability affects unknown code of the file /goform/SetStaticRouteCfg. The manipulation of the argument list leads to buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T02:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1897",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_3.pdf",
          "name" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_3.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298415",
          "name" : "VDB-298415 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298415",
          "name" : "VDB-298415 | Tenda TX3 SetNetControlList buffer overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506604",
          "name" : "Submit #506604 | Tenda TX3 V16.03.13.11_multi buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in Tenda TX3 16.03.13.11_multi. This issue affects some unknown processing of the file /goform/SetNetControlList. The manipulation of the argument list leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T02:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1898",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_4.pdf",
          "name" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_4.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298416",
          "name" : "VDB-298416 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298416",
          "name" : "VDB-298416 | Tenda TX3 openSchedWifi buffer overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506606",
          "name" : "Submit #506606 | Tenda TX3 V16.03.13.11_multi buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Tenda TX3 16.03.13.11_multi. Affected is an unknown function of the file /goform/openSchedWifi. The manipulation of the argument schedStartTime/schedEndTime leads to buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T02:15Z",
    "lastModifiedDate" : "2025-03-05T16:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1899",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          }, {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_5.pdf",
          "name" : "https://github.com/2664521593/mycve/blob/main/Tenda/TX3/tenda_tx3_bof_5.pdf",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298417",
          "name" : "VDB-298417 | CTI Indicators (IOB, IOC, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298417",
          "name" : "VDB-298417 | Tenda TX3 setPptpUserList buffer overflow",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506607",
          "name" : "Submit #506607 | Tenda TX3 V16.03.13.11_multi buffer overflow",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.tenda.com.cn/",
          "name" : "https://www.tenda.com.cn/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in Tenda TX3 16.03.13.11_multi and classified as critical. Affected by this vulnerability is an unknown functionality of the file /goform/setPptpUserList. The manipulation of the argument list leads to buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:tenda:tx3_firmware:16.03.13.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:tenda:tx3:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T03:15Z",
    "lastModifiedDate" : "2025-03-05T18:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1900",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/chenzi-dynasty/CVE/issues/2",
          "name" : "https://github.com/chenzi-dynasty/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/chenzi-dynasty/CVE/issues/2",
          "name" : "https://github.com/chenzi-dynasty/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298418",
          "name" : "VDB-298418 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298418",
          "name" : "VDB-298418 | PHPGurukul Restaurant Table Booking System add-table.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506609",
          "name" : "Submit #506609 | PHPGurukul RTBS Project PHP V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. Affected by this issue is some unknown functionality of the file /add-table.php. The manipulation of the argument tableno leads to sql injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-06T12:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1901",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/chenzi-dynasty/CVE/issues/1",
          "name" : "https://github.com/chenzi-dynasty/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/chenzi-dynasty/CVE/issues/1",
          "name" : "https://github.com/chenzi-dynasty/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298419",
          "name" : "VDB-298419 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298419",
          "name" : "VDB-298419 | PHPGurukul Restaurant Table Booking System check_availability.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.506612",
          "name" : "Submit #506612 | PHPGurukul RTBS Project PHP V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Restaurant Table Booking System 1.0. It has been classified as critical. This affects an unknown part of the file /admin/check_availability.php. The manipulation of the argument username leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-06T12:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1902",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/panghuanjie/Code-audits/issues/3",
          "name" : "https://github.com/panghuanjie/Code-audits/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/panghuanjie/Code-audits/issues/3",
          "name" : "https://github.com/panghuanjie/Code-audits/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298420",
          "name" : "VDB-298420 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298420",
          "name" : "VDB-298420 | PHPGurukul Student Record System password-recovery.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?submit.506623",
          "name" : "Submit #506623 | PHPGurukul Student Portal V3.2 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Student Record System 3.2. It has been declared as critical. This vulnerability affects unknown code of the file /password-recovery.php. The manipulation of the argument emailid leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:student_record_system:3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-06T12:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1903",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/takakie/CVE/blob/main/cve_3.md",
          "name" : "https://github.com/takakie/CVE/blob/main/cve_3.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/takakie/CVE/blob/main/cve_3.md",
          "name" : "https://github.com/takakie/CVE/blob/main/cve_3.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298421",
          "name" : "VDB-298421 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298421",
          "name" : "VDB-298421 | Codezips Online Shopping Website cart_add.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506667",
          "name" : "Submit #506667 | Codezips Online Shopping Website In PHP With Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in Codezips Online Shopping Website 1.0. It has been rated as critical. This issue affects some unknown processing of the file /cart_add.php. The manipulation of the argument id leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:online_shopping_website:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-06T12:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1904",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
          "name" : "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
          "name" : "https://github.com/lokihardk/cve/blob/main/xss-2_25.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298424",
          "name" : "VDB-298424 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298424",
          "name" : "VDB-298424 | code-projects Blood Bank System A+.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.506868",
          "name" : "Submit #506868 | code-projects blood-bank-system-in-php v1.0 v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank System 1.0. Affected by this issue is some unknown functionality of the file /Blood/A+.php. The manipulation of the argument Availibility leads to cross site scripting. The attack may be launched remotely."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T05:15Z",
    "lastModifiedDate" : "2025-03-06T12:20Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1905",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
          "name" : "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
          "name" : "https://github.com/sorcha-l/cve/blob/main/Employee%20Management%20System%20by%20rems%20has%20xss.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298425",
          "name" : "VDB-298425 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298425",
          "name" : "VDB-298425 | SourceCodester Employee Management System employee.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.508301",
          "name" : "Submit #508301 | https://www.sourcecodester.com/php/17847/employee-management-sys Employee Management System 1.0 Cross Site Scripting (XSS)",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, was found in SourceCodester Employee Management System 1.0. This affects an unknown part of the file employee.php. The manipulation of the argument Full Name leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:remyandrade:employee_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T05:15Z",
    "lastModifiedDate" : "2025-03-06T12:17Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1906",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/HaroldFinch-L/CVE/issues/2",
          "name" : "https://github.com/HaroldFinch-L/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/HaroldFinch-L/CVE/issues/2",
          "name" : "https://github.com/HaroldFinch-L/CVE/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298426",
          "name" : "VDB-298426 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?id.298426",
          "name" : "VDB-298426 | PHPGurukul Restaurant Table Booking System profile.php sql injection",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://vuldb.com/?submit.508915",
          "name" : "Submit #508915 | PHPGurukul RTBS Project PHP V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in PHPGurukul Restaurant Table Booking System 1.0 and classified as critical. This vulnerability affects unknown code of the file /admin/profile.php. The manipulation of the argument mobilenumber leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T05:15Z",
    "lastModifiedDate" : "2025-03-04T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1907",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-306"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-148-04",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.instantel.com/service-and-support/contact-technical-support",
          "name" : "https://www.instantel.com/service-and-support/contact-technical-support",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Instantel Micromate lacks authentication on a configuration port which could allow an attacker to execute commands if connected."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-30T00:15Z",
    "lastModifiedDate" : "2025-05-30T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1908",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-840"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitlab.com/gitlab-org/gitlab/-/issues/523065",
          "name" : "GitLab Issue #523065",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking" ]
        }, {
          "url" : "https://hackerone.com/reports/3016623",
          "name" : "HackerOne Bug Bounty Report #3016623",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An issue has been discovered in GitLab EE/CE that could allow an attacker to track users' browsing activities, potentially leading to full account take-over, affecting all versions from 16.6 before 17.9.7, 17.10 before 17.10.5, and 17.11 before 17.11.1."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "17.10.0",
          "versionEndExcluding" : "17.10.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:community:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:17.11.0:*:*:*:enterprise:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:community:*:*:*",
          "versionStartIncluding" : "16.6.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gitlab:gitlab:*:*:*:*:enterprise:*:*:*",
          "versionStartIncluding" : "16.6.0",
          "versionEndExcluding" : "17.9.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-24T08:15Z",
    "lastModifiedDate" : "2025-08-08T16:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1909",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          }, {
            "lang" : "en",
            "value" : "CWE-288"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.buddyboss.com/resources/buddyboss-platform-pro-releases/",
          "name" : "https://www.buddyboss.com/resources/buddyboss-platform-pro-releases/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.buddyboss.com/resources/buddyboss-platform-pro-releases/2-7-10/",
          "name" : "https://www.buddyboss.com/resources/buddyboss-platform-pro-releases/2-7-10/",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cce9b8b-0589-4b09-b184-a66fc86fcb46?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/7cce9b8b-0589-4b09-b184-a66fc86fcb46?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The BuddyBoss Platform Pro plugin for WordPress is vulnerable to authentication bypass in versions up to, and including, 2.7.01. This is due to insufficient verification on the user being supplied during the Apple OAuth authenticate request through the plugin. This makes it possible for unauthenticated attackers to log in as any existing user on the site, such as an administrator, if they have access to the email."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:buddyboss:buddyboss_platform:*:*:*:*:pro:wordpress:*:*",
          "versionEndExcluding" : "2.7.10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-05T20:15Z",
    "lastModifiedDate" : "2025-05-28T20:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1911",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L248",
          "name" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/history/history.php#L248",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "name" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d222ef6d-cdec-482e-92ba-65eeabbcdeae?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d222ef6d-cdec-482e-92ba-65eeabbcdeae?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.5.0. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:product_import_export_for_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.5.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-03-26T12:15Z",
    "lastModifiedDate" : "2025-07-09T16:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1912",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php#L175",
          "name" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php#L175",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "name" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/406b52dc-3d36-4b03-a932-34f456395979?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/406b52dc-3d36-4b03-a932-34f456395979?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.5.0 via the validate_file() Function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:product_import_export_for_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.5.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-03-26T12:15Z",
    "lastModifiedDate" : "2025-07-09T16:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1913",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php",
          "name" : "https://plugins.trac.wordpress.org/browser/product-import-export-for-woo/trunk/admin/modules/import/classes/class-import-ajax.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3261194/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "name" : "https://wordpress.org/plugins/product-import-export-for-woo/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4464bb1-273a-42c4-a7ec-8e123d286963?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/d4464bb1-273a-42c4-a7ec-8e123d286963?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Product Import Export for WooCommerce – Import Export Product CSV Suite plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.5.0 via deserialization of untrusted input from the 'form_data' parameter This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:product_import_export_for_woocommerce:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.5.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-26T12:15Z",
    "lastModifiedDate" : "2025-07-09T16:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1914",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/397731718",
          "name" : "https://issues.chromium.org/issues/397731718",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds read in V8 in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to perform out of bounds memory access via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1915",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/391114799",
          "name" : "https://issues.chromium.org/issues/391114799",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Limitation of a Pathname to a Restricted Directory in DevTools in Google Chrome on Windows prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to bypass file access restrictions via a crafted Chrome Extension. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "134.0.6998.35",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1916",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/376493203",
          "name" : "https://issues.chromium.org/issues/376493203",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free in Profiles in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1917",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1021"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/329476341",
          "name" : "https://issues.chromium.org/issues/329476341",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Browser UI in Google Chrome on Android prior to 134.0.6998.35 allowed a remote attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "134.0.6998.35",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1918",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/388557904",
          "name" : "https://issues.chromium.org/issues/388557904",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds read in PDFium in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted PDF file. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1919",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/392375312",
          "name" : "https://issues.chromium.org/issues/392375312",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out of bounds read in Media in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1920",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop_10.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/398065918",
          "name" : "https://issues.chromium.org/issues/398065918",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Type Confusion in V8 in Google Chrome prior to 134.0.6998.88 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.88",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-10T21:15Z",
    "lastModifiedDate" : "2025-04-07T18:54Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1921",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1230"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/387583503",
          "name" : "https://issues.chromium.org/issues/387583503",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Media Stream in Google Chrome prior to 134.0.6998.35 allowed a remote attacker to obtain information about a peripheral via a crafted HTML page. (Chromium security severity: Medium)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:42Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1922",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-451"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/384033062",
          "name" : "https://issues.chromium.org/issues/384033062",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Selection in Google Chrome on Android prior to 134.0.6998.35 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "134.0.6998.35",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:google:android:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1923",
        "ASSIGNER" : "chrome-cve-admin@google.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1021"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "name" : "https://chromereleases.googleblog.com/2025/03/stable-channel-update-for-desktop.html",
          "refsource" : "",
          "tags" : [ "Release Notes" ]
        }, {
          "url" : "https://issues.chromium.org/issues/382540635",
          "name" : "https://issues.chromium.org/issues/382540635",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Inappropriate implementation in Permission Prompts in Google Chrome prior to 134.0.6998.35 allowed an attacker who convinced a user to install a malicious extension to perform UI spoofing via a crafted Chrome Extension. (Chromium security severity: Low)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:google:chrome:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "134.0.6998.35",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T04:15Z",
    "lastModifiedDate" : "2025-04-01T20:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1925",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/guoweifk/BugReport/blob/main/Open5GS%20AMF%20Denial%20of%20Service%20via%20PDU%20Session%20ID%20Conflict",
          "name" : "https://github.com/guoweifk/BugReport/blob/main/Open5GS%20AMF%20Denial%20of%20Service%20via%20PDU%20Session%20ID%20Conflict",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/open5gs/open5gs/pull/3711",
          "name" : "https://github.com/open5gs/open5gs/pull/3711",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Vendor Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298513",
          "name" : "VDB-298513 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298513",
          "name" : "VDB-298513 | Open5GS AMF nsmf-handler.c amf_nsmf_pdusession_handle_update_sm_context denial of service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.506038",
          "name" : "Submit #506038 | Open5GS <=v2.7.2 Denial of Service",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in Open5GS up to 2.7.2. Affected by this vulnerability is the function amf_nsmf_pdusession_handle_update_sm_context of the file src/amf/nsmf-handler.c of the component AMF. The manipulation leads to denial of service. The attack can be launched remotely. This vulnerability allows a single UE to crash the AMF, resulting in the complete loss of mobility and session management services and causing a network-wide outage. All registered UEs will lose connectivity, and new registrations will be blocked until the AMF is restarted, leading to a high availability impact. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:open5gs:open5gs:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "2.7.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-06-23T15:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1926",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-352"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/pagelayer/tags/1.9.8/init.php#L477",
          "name" : "https://plugins.trac.wordpress.org/browser/pagelayer/tags/1.9.8/init.php#L477",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/542b6312-b264-49d5-882a-454427c60c8a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/542b6312-b264-49d5-882a-454427c60c8a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Page Builder: Pagelayer – Drag and Drop website builder plugin for WordPress is vulnerable to Cross-Site Request Forgery in all versions up to, and including, 1.9.8. This is due to missing or incorrect nonce validation on the pagelayer_save_post function. This makes it possible for unauthenticated attackers to modify post contents via a forged request, granted they can trick a site administrator into performing an action such as clicking on a link."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:pagelayer:pagelayer:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "1.9.9",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-10T05:15Z",
    "lastModifiedDate" : "2025-05-26T02:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1929",
        "ASSIGNER" : "cve@usom.gov.tr"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.usom.gov.tr/bildirim/tr-25-0198",
          "name" : "https://www.usom.gov.tr/bildirim/tr-25-0198",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') vulnerability in Risk Yazilim Teknolojileri Ltd. Sti. Reel Sektör Hazine ve Risk Yönetimi Yazilimi allows SQL Injection, CAPEC - 7 - Blind SQL Injection.This issue affects Reel Sektör Hazine ve Risk Yönetimi Yazilimi: through 1.0.0.4."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-08-15T12:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1930",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1902309",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1902309",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On Windows, a compromised content process could use bad StreamData sent over AudioIPC to trigger a use-after-free in the Browser process. This could have led to a sandbox escape. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.21.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "116.0",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "128.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:-:*:*:*",
          "versionStartExcluding" : "1.28.8",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-04T15:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1931",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1944126",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1944126",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "It was possible to cause a use-after-free in the content process side of a WebTransport connection, leading to a potentially exploitable crash. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.21.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "116.0",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1932",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1944313",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1944313",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An inconsistent comparator in xslt/txNodeSorter could have resulted in potentially exploitable out-of-bounds access. Only affected version 122 and later. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "]",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-03-28T20:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1933",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1946004",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "On 64-bit CPUs, when the JIT compiles WASM i32 return values they can pick up bits from left over memory. This can potentially cause them to be treated as a different type. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.21.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionStartIncluding" : "116.0",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1934",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-Other"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1942881",
          "refsource" : "",
          "tags" : [ "Issue Tracking", "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "It was possible to interrupt the processing of a RegExp bailout and run additional JavaScript, potentially triggering garbage collection when the engine was not expecting it. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:29Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1935",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1866661",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A web page could trick a user into setting that site as the default handler for a custom URL protocol. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1936",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940027",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1940027",
          "refsource" : "",
          "tags" : [ "Permissions Required" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "jar: URLs retrieve local file content packaged in a ZIP archive. The null and everything after it was ignored when retrieving the content from the archive, but the fake extension after the null was used to determine the type of content. This could have been used to hide code in a web extension disguised as something else like an image. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:-:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-06-24T17:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1937",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "http://www.openwall.com/lists/oss-security/2025/03/10/6",
          "name" : "http://www.openwall.com/lists/oss-security/2025/03/10/6",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1938471%2C1940716",
          "name" : "Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 115.21, Firefox ESR 128.8, and Thunderbird 128.8",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-15/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 115.20, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 115.21, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "115.21.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.8.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1938",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1922889%2C1935004%2C1943586%2C1943912%2C1948111",
          "name" : "Memory safety bugs fixed in Firefox 136, Thunderbird 136, Firefox ESR 128.8, and Thunderbird 128.8",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-16/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-18/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 135, Thunderbird 135, Firefox ESR 128.7, and Thunderbird 128.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136, Firefox ESR < 128.8, Thunderbird < 136, and Thunderbird < 128.8."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:esr:*:*:*",
          "versionEndExcluding" : "128.7.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "129.0",
          "versionEndExcluding" : "135.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1939",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1928334",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1928334",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Android apps can load web pages using the Custom Tabs feature. This feature supports a transition animation that could have been used to trick a user into granting sensitive permissions by hiding what the user was actually clicking. This vulnerability affects Firefox < 136."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1940",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1908488",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A select option could partially obscure the confirmation prompt shown before launching external apps. This could be used to trick a user in to launching an external app unexpectedly. \n*This issue only affects Android versions of Firefox.* This vulnerability affects Firefox < 136."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1941",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1944665",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1944665",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Under certain circumstances, a user opt-in setting that Focus should require authentication before use could have been be bypassed (distinct from CVE-2025-0245). This vulnerability affects Firefox < 136."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-03-28T20:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1942",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1947139",
          "name" : "https://bugzilla.mozilla.org/show_bug.cgi?id=1947139",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When String.toUpperCase() caused a string to get longer it was possible for uninitialized memory to be incorporated into the result string This vulnerability affects Firefox < 136 and Thunderbird < 136."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-03-28T20:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1943",
        "ASSIGNER" : "security@mozilla.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bugzilla.mozilla.org/buglist.cgi?bug_id=1869650%2C1938451%2C1940326%2C1944052%2C1944063%2C1947281",
          "name" : "Memory safety bugs fixed in Firefox 136 and Thunderbird 136",
          "refsource" : "",
          "tags" : [ "Broken Link" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-14/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "name" : "https://www.mozilla.org/security/advisories/mfsa2025-17/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Memory safety bugs present in Firefox 135 and Thunderbird 135. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 136 and Thunderbird < 136."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:firefox:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mozilla:thunderbird:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "136.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T14:15Z",
    "lastModifiedDate" : "2025-04-03T13:30Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1944",
        "ASSIGNER" : "security@sonatype.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781",
          "name" : "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82",
          "name" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-7q5r-7gvp-wc82",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944",
          "name" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1944",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "picklescan before 0.0.23 is vulnerable to a ZIP archive manipulation attack that causes it to crash when attempting to extract and scan PyTorch model archives. By modifying the filename in the ZIP header while keeping the original filename in the directory listing, an attacker can make PickleScan raise a BadZipFile error. However, PyTorch's more forgiving ZIP implementation still allows the model to be loaded, enabling malicious payloads to bypass detection."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.0.23",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-10T12:15Z",
    "lastModifiedDate" : "2025-03-19T16:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1945",
        "ASSIGNER" : "security@sonatype.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781",
          "name" : "https://github.com/mmaitre314/picklescan/commit/e58e45e0d9e091159c1554f9b04828bbb40b9781",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792",
          "name" : "https://github.com/mmaitre314/picklescan/security/advisories/GHSA-w8jq-xcqf-f792",
          "refsource" : "",
          "tags" : [ "Exploit", "Vendor Advisory" ]
        }, {
          "url" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945",
          "name" : "https://sites.google.com/sonatype.com/vulnerabilities/cve-2025-1945",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "picklescan before 0.0.23 fails to detect malicious pickle files inside PyTorch model archives when certain ZIP file flag bits are modified. By flipping specific bits in the ZIP file headers, an attacker can embed malicious pickle files that remain undetected by PickleScan while still being successfully loaded by PyTorch's torch.load(). This can lead to arbitrary code execution when loading a compromised model."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mmaitre314:picklescan:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "0.0.23",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-10T12:15Z",
    "lastModifiedDate" : "2025-03-19T16:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1946",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/heiheixz/report/blob/main/nxb_1.md",
          "name" : "https://github.com/heiheixz/report/blob/main/nxb_1.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298520",
          "name" : "VDB-298520 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298520",
          "name" : "VDB-298520 | hzmanyun Education and Training System exportPDF command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.506657",
          "name" : "Submit #506657 | hzmanyun.com education and training system v2.1 Command Injection To RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in hzmanyun Education and Training System 2.1. It has been rated as critical. Affected by this issue is the function exportPDF of the file /user/exportPDF. The manipulation of the argument id leads to command injection. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-04T19:15Z",
    "lastModifiedDate" : "2025-03-04T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1947",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/heiheixz/report/blob/main/nxb_2.md",
          "name" : "https://github.com/heiheixz/report/blob/main/nxb_2.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298521",
          "name" : "VDB-298521 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298521",
          "name" : "VDB-298521 | hzmanyun Education and Training System UploadImageController.java scorm command injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.506659",
          "name" : "Submit #506659 | hzmanyun.com education and training system v2.1.3 RCE",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in hzmanyun Education and Training System 2.1.3. This affects the function scorm of the file UploadImageController.java. The manipulation of the argument param leads to command injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 6.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-04T19:15Z",
    "lastModifiedDate" : "2025-03-04T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1948",
        "ASSIGNER" : "security@eclipse.org"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
          "name" : "https://github.com/jetty/jetty.project/security/advisories/GHSA-889j-63jv-qhr8",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
          "name" : "https://gitlab.eclipse.org/security/cve-assignement/-/issues/56",
          "refsource" : "",
          "tags" : [ "Issue Tracking" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "In Eclipse Jetty versions 12.0.0 to 12.0.16 included, an HTTP/2 client can specify a very large value for the HTTP/2 settings parameter SETTINGS_MAX_HEADER_LIST_SIZE.\nThe Jetty HTTP/2 server does not perform validation on this setting, and tries to allocate a ByteBuffer of the specified capacity to encode HTTP responses, likely resulting in OutOfMemoryError being thrown, or even the JVM process exiting."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:eclipse:jetty:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndExcluding" : "12.0.17",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-08T18:15Z",
    "lastModifiedDate" : "2025-07-31T16:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1949",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Sinon2003/cve/blob/main/zzcms/xss-register_nodb.php.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/zzcms/xss-register_nodb.php.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Sinon2003/cve/blob/main/zzcms/xss-register_nodb.php.md",
          "name" : "https://github.com/Sinon2003/cve/blob/main/zzcms/xss-register_nodb.php.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298541",
          "name" : "VDB-298541 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298541",
          "name" : "VDB-298541 | ZZCMS URL register_nodb.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.508909",
          "name" : "Submit #508909 | ZZCMS 2025 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in ZZCMS 2025. This issue affects some unknown processing of the file /3/ucenter_api/code/register_nodb.php of the component URL Handler. The manipulation of the argument $_SERVER['PHP_SELF'] leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:zzcms:zzcms:2025:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T19:15Z",
    "lastModifiedDate" : "2025-04-23T15:00Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1950",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-114"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231507",
          "name" : "https://www.ibm.com/support/pages/node/7231507",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands locally due to improper validation of libraries of an untrusted source."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.2.1030.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.3.1050.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-22T15:16Z",
    "lastModifiedDate" : "2025-08-14T01:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1951",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-250"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7231389",
          "name" : "https://www.ibm.com/support/pages/node/7231389",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Hardware Management Console - Power Systems V10.2.1030.0 and V10.3.1050.0 could allow a local user to execute commands as a privileged user due to execution of commands with unnecessary privileges."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.2.1030.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:hardware_management_console:10.3.1050.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-22T15:16Z",
    "lastModifiedDate" : "2025-08-12T18:09Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1952",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/zrlianc/CVE/issues/1",
          "name" : "https://github.com/zrlianc/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/zrlianc/CVE/issues/1",
          "name" : "https://github.com/zrlianc/CVE/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298542",
          "name" : "VDB-298542 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298542",
          "name" : "VDB-298542 | PHPGurukul Restaurant Table Booking System password-recovery.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.509955",
          "name" : "Submit #509955 | PHPGurukul RTBS Project PHP v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in PHPGurukul Restaurant Table Booking System 1.0. Affected is an unknown function of the file /admin/password-recovery.php. The manipulation of the argument username/mobileno leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:restaurant_table_booking_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T19:15Z",
    "lastModifiedDate" : "2025-04-03T13:31Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1953",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-310"
          }, {
            "lang" : "en",
            "value" : "CWE-330"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/vllm-project/aibrix/issues/749",
          "name" : "https://github.com/vllm-project/aibrix/issues/749",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/vllm-project/aibrix/issues/749#event-16488517974",
          "name" : "https://github.com/vllm-project/aibrix/issues/749#event-16488517974",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/vllm-project/aibrix/pull/752",
          "name" : "https://github.com/vllm-project/aibrix/pull/752",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/vllm-project/aibrix/pull/752/commits/3d25d95aebd66f24a549200edcebc5ea423b317a",
          "name" : "https://github.com/vllm-project/aibrix/pull/752/commits/3d25d95aebd66f24a549200edcebc5ea423b317a",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298543",
          "name" : "VDB-298543 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298543",
          "name" : "VDB-298543 | vLLM AIBrix Prefix Caching hash.go random values",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.509958",
          "name" : "Submit #509958 | Vllm aibrix 0.2.0 prefix cache reuse",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in vLLM AIBrix 0.2.0 and classified as problematic. Affected by this vulnerability is an unknown functionality of the file pkg/plugins/gateway/prefixcacheindexer/hash.go of the component Prefix Caching. The manipulation leads to insufficiently random values. The complexity of an attack is rather high. The exploitation appears to be difficult. Upgrading to version 0.3.0 is able to address this issue. It is recommended to upgrade the affected component."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 2.6,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-04T20:15Z",
    "lastModifiedDate" : "2025-03-04T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1954",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/sorcha-l/cve/blob/main/Human%20Metapneumovirus%20(HMPV)%20%E2%80%93%20Testing%20Management%20System%20%20SQL%20Injection%20Vulnerability.md",
          "name" : "https://github.com/sorcha-l/cve/blob/main/Human%20Metapneumovirus%20(HMPV)%20%E2%80%93%20Testing%20Management%20System%20%20SQL%20Injection%20Vulnerability.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298555",
          "name" : "VDB-298555 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298555",
          "name" : "VDB-298555 | PHPGurukul Human Metapneumovirus Testing Management System login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.510360",
          "name" : "Submit #510360 | https://phpgurukul.com/human-metapneumovirus-hmpv-testing-manage Human Metapneumovirus (HMPV) – Testing Management System 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in PHPGurukul Human Metapneumovirus Testing Management System 1.0. It has been declared as critical. Affected by this vulnerability is an unknown functionality of the file /login.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:human_metapneumovirus_testing_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T21:15Z",
    "lastModifiedDate" : "2025-05-08T19:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1955",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://hexotion.notion.site/Online-Class-and-Exam-Scheduling-System-in-PHP-has-Stored-Cross-Site-Scripting-vulnerability-in-prof-1a7bb766cf32809b9f0be980e90d83f7?pvs=73",
          "name" : "https://hexotion.notion.site/Online-Class-and-Exam-Scheduling-System-in-PHP-has-Stored-Cross-Site-Scripting-vulnerability-in-prof-1a7bb766cf32809b9f0be980e90d83f7?pvs=73",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298556",
          "name" : "VDB-298556 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298556",
          "name" : "VDB-298556 | code-projects Online Class and Exam Scheduling System profile.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.510689",
          "name" : "Submit #510689 | code-projects Online Class and Exam Scheduling System 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in code-projects Online Class and Exam Scheduling System 1.0. It has been rated as problematic. Affected by this issue is some unknown functionality of the file /Scheduling/scheduling/pages/profile.php. The manipulation of the argument username leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:online_class_and_exam_scheduling_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-04T21:15Z",
    "lastModifiedDate" : "2025-05-21T15:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1956",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74",
          "name" : "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74",
          "name" : "https://hexotion.notion.site/Shopping-Portal-in-PHP-has-Stored-SQL-injection-vulnerability-in-admin-index-php-1a7bb766cf3280e8bb81eaa59c4c2b74",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298557",
          "name" : "VDB-298557 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298557",
          "name" : "VDB-298557 | code-projects Shopping Portal Login index.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.510696",
          "name" : "Submit #510696 | code-projects Shopping Portal Using PHP With Source Code 1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in code-projects Shopping Portal 1.0. This affects an unknown part of the file /Shopping/Admin/index.php of the component Login. The manipulation of the argument password leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:shopping_portal:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T22:15Z",
    "lastModifiedDate" : "2025-04-03T13:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1957",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          }, {
            "lang" : "en",
            "value" : "CWE-94"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/Corgile/cve/blob/main/cve.md",
          "name" : "https://github.com/Corgile/cve/blob/main/cve.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Corgile/cve/blob/main/cve.md",
          "name" : "https://github.com/Corgile/cve/blob/main/cve.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298558",
          "name" : "VDB-298558 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298558",
          "name" : "VDB-298558 | code-projects Blood Bank System o+.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.510705",
          "name" : "Submit #510705 | code-projects blood-bank-system php v1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as problematic was found in code-projects Blood Bank System 1.0. This vulnerability affects unknown code of the file /BBfile/Blood/o+.php. The manipulation of the argument Bloodname leads to cross site scripting. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:code-projects:blood_bank_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 3.5,
          "baseSeverity" : "LOW"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 1.4
      },
      "baseMetricV2" : {
        "cvssV2" : {
          "version" : "2.0",
          "vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:N",
          "accessVector" : "NETWORK",
          "accessComplexity" : "LOW",
          "authentication" : "SINGLE",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "PARTIAL",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.0
        },
        "severity" : "MEDIUM",
        "exploitabilityScore" : 8.0,
        "impactScore" : 2.9,
        "acInsufInfo" : false,
        "obtainAllPrivilege" : false,
        "obtainUserPrivilege" : false,
        "obtainOtherPrivilege" : false,
        "userInteractionRequired" : false
      }
    },
    "publishedDate" : "2025-03-04T22:15Z",
    "lastModifiedDate" : "2025-04-03T13:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1958",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/qkdjksfkeg/cve_article/blob/main/oasys/SQL%20injection.md",
          "name" : "https://github.com/qkdjksfkeg/cve_article/blob/main/oasys/SQL%20injection.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/qkdjksfkeg/cve_article/blob/main/oasys/SQL%20injection.md",
          "name" : "https://github.com/qkdjksfkeg/cve_article/blob/main/oasys/SQL%20injection.md",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298559",
          "name" : "VDB-298559 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?id.298559",
          "name" : "VDB-298559 | aaluoxiang oa_system address-mapper.xml sql injection",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://vuldb.com/?submit.510750",
          "name" : "Submit #510750 | oasys V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, has been found in aaluoxiang oa_system 1.0. This issue affects some unknown processing of the file src/main/resources/mappers/address-mapper.xml. The manipulation of the argument outtype leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T22:15Z",
    "lastModifiedDate" : "2025-03-05T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1959",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/CContinueee/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/CContinueee/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/CContinueee/CVE/blob/main/CVE_1.md",
          "name" : "https://github.com/CContinueee/CVE/blob/main/CVE_1.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298560",
          "name" : "VDB-298560 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298560",
          "name" : "VDB-298560 | Codezips Gym Management System change_s_pwd.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.510782",
          "name" : "Submit #510782 | Codezips Gym Management System in PHP with Source Code V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as critical, was found in Codezips Gym Management System 1.0. Affected is an unknown function of the file /change_s_pwd.php. The manipulation of the argument login_id/login_key leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:codezips:gym_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T23:15Z",
    "lastModifiedDate" : "2025-04-03T13:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1960",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-03.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-03&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-03.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-1188: Initialization of a Resource with an Insecure Default vulnerability exists that could cause an\nattacker to execute unauthorized commands when a system’s default password credentials have not been\nchanged on first use. The default username is not displayed correctly in the WebHMI interface."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-03-13T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1961",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/web_crud.php_SQLi.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/web_crud.php_SQLi.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/Yesec/Best-church-management-software/blob/main/web_crud.php_SQLi.md",
          "name" : "https://github.com/Yesec/Best-church-management-software/blob/main/web_crud.php_SQLi.md",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298561",
          "name" : "VDB-298561 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298561",
          "name" : "VDB-298561 | SourceCodester Best Church Management Software web_crud.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.510865",
          "name" : "Submit #510865 | SourceCodester Best church management software 1.1 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://www.sourcecodester.com/",
          "name" : "https://www.sourcecodester.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability has been found in SourceCodester Best Church Management Software 1.1 and classified as critical. Affected by this vulnerability is an unknown functionality of the file /admin/app/web_crud.php. The manipulation of the argument encryption leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mayurik:best_church_management_software:1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T23:15Z",
    "lastModifiedDate" : "2025-04-29T16:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1962",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ubfbuz3/cve/issues/1",
          "name" : "https://github.com/ubfbuz3/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/ubfbuz3/cve/issues/1",
          "name" : "https://github.com/ubfbuz3/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298563",
          "name" : "VDB-298563 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298563",
          "name" : "VDB-298563 | projectworlds Online Hotel Booking addroom.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.511426",
          "name" : "Submit #511426 | Projectworlds Online Hotel Booking In PHP v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry", "Exploit" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been classified as critical. This affects an unknown part of the file /admin/addroom.php. The manipulation of the argument roomname leads to sql injection. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:online_hotel_booking:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T00:15Z",
    "lastModifiedDate" : "2025-04-02T18:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1963",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ubfbuz3/cve/issues/2",
          "name" : "https://github.com/ubfbuz3/cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/ubfbuz3/cve/issues/2",
          "name" : "https://github.com/ubfbuz3/cve/issues/2",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298564",
          "name" : "VDB-298564 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298564",
          "name" : "VDB-298564 | projectworlds Online Hotel Booking reservation.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.511466",
          "name" : "Submit #511466 | Projectworlds Online Hotel Booking In PHP v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been declared as critical. This vulnerability affects unknown code of the file /reservation.php. The manipulation of the argument checkin leads to sql injection. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:online_hotel_booking:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T00:15Z",
    "lastModifiedDate" : "2025-04-02T18:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1964",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          }, {
            "lang" : "en",
            "value" : "CWE-74"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ubfbuz3/cve/issues/3",
          "name" : "https://github.com/ubfbuz3/cve/issues/3",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298565",
          "name" : "VDB-298565 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298565",
          "name" : "VDB-298565 | projectworlds Online Hotel Booking booknow.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.511471",
          "name" : "Submit #511471 | Projectworlds Online Hotel Booking In PHP v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability was found in projectworlds Online Hotel Booking 1.0. It has been rated as critical. This issue affects some unknown processing of the file /booknow.php?roomname=Duplex. The manipulation of the argument checkin leads to sql injection. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:online_hotel_booking:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T01:15Z",
    "lastModifiedDate" : "2025-05-15T20:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1965",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ubfbuz3/cve/issues/4",
          "name" : "https://github.com/ubfbuz3/cve/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://github.com/ubfbuz3/cve/issues/4",
          "name" : "https://github.com/ubfbuz3/cve/issues/4",
          "refsource" : "",
          "tags" : [ "Exploit", "Issue Tracking", "Third Party Advisory" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298566",
          "name" : "VDB-298566 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298566",
          "name" : "VDB-298566 | projectworlds Online Hotel Booking login.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.511473",
          "name" : "Submit #511473 | Projectworlds Online Hotel Booking In PHP v1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical has been found in projectworlds Online Hotel Booking 1.0. Affected is an unknown function of the file /admin/login.php. The manipulation of the argument emailusername leads to sql injection. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:projectworlds:online_hotel_booking:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T01:15Z",
    "lastModifiedDate" : "2025-04-02T18:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1966",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/SECWG/cve/issues/1",
          "name" : "https://github.com/SECWG/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://github.com/SECWG/cve/issues/1",
          "name" : "https://github.com/SECWG/cve/issues/1",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory", "Issue Tracking" ]
        }, {
          "url" : "https://phpgurukul.com/",
          "name" : "https://phpgurukul.com/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298567",
          "name" : "VDB-298567 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298567",
          "name" : "VDB-298567 | PHPGurukul Pre-School Enrollment System index.php sql injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.512039",
          "name" : "Submit #512039 | PHPGurukul Pre-School Enrollment System V1.0 SQL Injection",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability classified as critical was found in PHPGurukul Pre-School Enrollment System 1.0. Affected by this vulnerability is an unknown functionality of the file /admin/index.php. The manipulation of the argument username leads to sql injection. The attack can be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:phpgurukul:pre-school_enrollment_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-05T02:15Z",
    "lastModifiedDate" : "2025-04-02T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1967",
        "ASSIGNER" : "cna@vuldb.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://code-projects.org/",
          "name" : "https://code-projects.org/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://github.com/intercpt/XSS1/blob/main/XSS.md",
          "name" : "https://github.com/intercpt/XSS1/blob/main/XSS.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://github.com/intercpt/XSS1/blob/main/XSS.md",
          "name" : "https://github.com/intercpt/XSS1/blob/main/XSS.md",
          "refsource" : "",
          "tags" : [ "Exploit" ]
        }, {
          "url" : "https://vuldb.com/?ctiid.298568",
          "name" : "VDB-298568 | CTI Indicators (IOB, IOC, TTP, IOA)",
          "refsource" : "",
          "tags" : [ "Permissions Required", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?id.298568",
          "name" : "VDB-298568 | code-projects Blood Bank Management System donor.php cross site scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        }, {
          "url" : "https://vuldb.com/?submit.512163",
          "name" : "Submit #512163 | code-projects Blood Bank Management System In PHP With Source Code 1.0 Cross Site Scripting",
          "refsource" : "",
          "tags" : [ "Third Party Advisory", "VDB Entry" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability, which was classified as problematic, has been found in code-projects Blood Bank Management System 1.0. Affected by this issue is some unknown functionality of the file /user_dashboard/donor.php. The manipulation of the argument name leads to cross site scripting. The attack may be launched remotely. The exploit has been disclosed to the public and may be used."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:blood_bank_management_system_project:blood_bank_management_system:1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T02:15Z",
    "lastModifiedDate" : "2025-04-03T13:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1968",
        "ASSIGNER" : "security@progress.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-613"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://community.progress.com/s/article/Sitefinity-Security-Advisory-for-Addressing-Security-Vulnerability-CVE-2025-1968-April-2025",
          "name" : "https://community.progress.com/s/article/Sitefinity-Security-Advisory-for-Addressing-Security-Vulnerability-CVE-2025-1968-April-2025",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient Session Expiration vulnerability in Progress Software Corporation Sitefinity under some specific and uncommon circumstances allows reusing Session IDs (Session Replay Attacks).This issue affects Sitefinity: from 14.0 through 14.3, from 14.4 before 14.4.8145, from 15.0 before 15.0.8231, from 15.1 before 15.1.8332, from 15.2 before 15.2.8429."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-09T14:15Z",
    "lastModifiedDate" : "2025-04-09T20:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1969",
        "ASSIGNER" : "aws-security@amazon.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-004/",
          "name" : "https://aws.amazon.com/security/security-bulletins/AWS-2025-004/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/aws-samples/iam-identity-center-team/security/advisories/GHSA-x9xv-r58p-qh86",
          "name" : "https://github.com/aws-samples/iam-identity-center-team/security/advisories/GHSA-x9xv-r58p-qh86",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper request input validation in Temporary Elevated Access Management (TEAM) for AWS IAM Identity Center allows a user to modify a valid request and spoof an approval in TEAM.\n\nUpgrade TEAM to the latest release v.1.2.2. Follow instructions in updating TEAM documentation for updating process"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-04T19:15Z",
    "lastModifiedDate" : "2025-03-04T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1970",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/import/classes/class-import-ajax.php#L175",
          "name" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/import/classes/class-import-ajax.php#L175",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "name" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a4d7d40-8e0e-4251-8e25-3fd4ebd3a93e?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/5a4d7d40-8e0e-4251-8e25-3fd4ebd3a93e?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Export and Import Users and Customers plugin for WordPress is vulnerable to Server-Side Request Forgery in all versions up to, and including, 2.6.2 via the validate_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to make web requests to arbitrary locations originating from the web application and can be used to query and modify information from internal services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-03-22T12:15Z",
    "lastModifiedDate" : "2025-07-09T17:57Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1971",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/export/classes/class-export-ajax.php",
          "name" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/export/classes/class-export-ajax.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/import/classes/class-import-ajax.php",
          "name" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/import/classes/class-import-ajax.php",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "name" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b24b3d2-589f-47b2-bcdd-bebc87cafeda?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/4b24b3d2-589f-47b2-bcdd-bebc87cafeda?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Export and Import Users and Customers plugin for WordPress is vulnerable to PHP Object Injection in all versions up to, and including, 2.6.2 via deserialization of untrusted input from the 'form_data' parameter. This makes it possible for authenticated attackers, with Administrator-level access and above, to inject a PHP Object. No known POP chain is present in the vulnerable software, which means this vulnerability has no impact unless another plugin or theme containing a POP chain is installed on the site. If a POP chain is present via an additional plugin or theme installed on the target system, it may allow the attacker to perform actions like delete arbitrary files, retrieve sensitive data, or execute code depending on the POP chain present."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-22T12:15Z",
    "lastModifiedDate" : "2025-07-09T17:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1972",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/history/history.php#L248",
          "name" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/history/history.php#L248",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "name" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d443c70-6537-4c6d-a282-12d392f0f558?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/2d443c70-6537-4c6d-a282-12d392f0f558?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Export and Import Users and Customers plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the admin_log_page() function in all versions up to, and including, 2.6.2. This makes it possible for authenticated attackers, with Administrator-level access and above, to delete arbitrary log files on the server."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-03-22T12:15Z",
    "lastModifiedDate" : "2025-07-09T17:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1973",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-22"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/history/history.php#L751",
          "name" : "https://plugins.trac.wordpress.org/browser/users-customers-import-export-for-wp-woocommerce/trunk/admin/modules/history/history.php#L751",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3259688/",
          "refsource" : "",
          "tags" : [ "Patch" ]
        }, {
          "url" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "name" : "https://wordpress.org/plugins/users-customers-import-export-for-wp-woocommerce/#developers",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/13b7a2e4-59f4-4d61-a165-a830ccfb696a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/13b7a2e4-59f4-4d61-a165-a830ccfb696a?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Export and Import Users and Customers plugin for WordPress is vulnerable to Path Traversal in all versions up to, and including, 2.6.2 via the download_file() function. This makes it possible for authenticated attackers, with Administrator-level access and above, to read the contents of arbitrary log files on the server, which can contain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:webtoffee:import_export_wordpress_users:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "2.6.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-22T12:15Z",
    "lastModifiedDate" : "2025-07-09T17:43Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1974",
        "ASSIGNER" : "security@kubernetes.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://https://github.com/kubernetes/kubernetes/issues/131009",
          "name" : "https://https://github.com/kubernetes/kubernetes/issues/131009",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A security issue was discovered in Kubernetes where under certain conditions, an unauthenticated attacker with access to the pod network can achieve arbitrary code execution in the context of the ingress-nginx controller. This can lead to disclosure of Secrets accessible to the controller. (Note that in the default installation, the controller can access all Secrets cluster-wide.)"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-25T00:15Z",
    "lastModifiedDate" : "2025-03-25T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1975",
        "ASSIGNER" : "security@huntr.dev"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-129"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://huntr.com/bounties/921ba5d4-f1d0-4c66-9764-4f72dffe7acd",
          "name" : "https://huntr.com/bounties/921ba5d4-f1d0-4c66-9764-4f72dffe7acd",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Ollama server version 0.5.11 allows a malicious user to cause a Denial of Service (DoS) attack by customizing the manifest content and spoofing a service. This is due to improper validation of array index access when downloading a model via the /api/pull endpoint, which can lead to a server crash."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ollama:ollama:0.5.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-16T09:15Z",
    "lastModifiedDate" : "2025-06-24T16:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1976",
        "ASSIGNER" : "sirt@brocade.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25602",
          "name" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25602",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Brocade Fabric OS versions starting with 9.1.0 have root access removed, however, a local user with admin privilege can potentially execute arbitrary code with full root privileges on Fabric OS versions 9.1.0 through 9.1.1d6."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:broadcom:fabric_operating_system:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.1.0",
          "versionEndExcluding" : "9.1.1d7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-24T03:15Z",
    "lastModifiedDate" : "2025-04-29T19:49Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1979",
        "ASSIGNER" : "report@snyk.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/ray-project/ray/commit/64a2e4010522d60b90c389634f24df77b603d85d",
          "name" : "https://github.com/ray-project/ray/commit/64a2e4010522d60b90c389634f24df77b603d85d",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ray-project/ray/issues/50266",
          "name" : "https://github.com/ray-project/ray/issues/50266",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://github.com/ray-project/ray/pull/50409",
          "name" : "https://github.com/ray-project/ray/pull/50409",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://security.snyk.io/vuln/SNYK-PYTHON-RAY-8745212",
          "name" : "https://security.snyk.io/vuln/SNYK-PYTHON-RAY-8745212",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Versions of the package ray before 2.43.0 are vulnerable to Insertion of Sensitive Information into Log File where the redis password is being logged in the standard logging. If the redis password is passed as an argument, it will be logged and could potentially leak the password.\r\rThis is only exploitable if:\r\r1) Logging is enabled;\r\r2) Redis is using password authentication;\r\r3) Those logs are accessible to an attacker, who can reach that redis instance.\r\r**Note:**\r\rIt is recommended that anyone who is running in this configuration should update to the latest version of Ray, then rotate their redis password."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-06T05:15Z",
    "lastModifiedDate" : "2025-03-06T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1980",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ready-os.com/pl/",
          "name" : "https://ready-os.com/pl/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Ready_ application's Profile section allows users to upload files of any type and extension without restriction. If the server is misconfigured, as it was by default when installed at the turn of 2021 and 2022, it can result in Remote Code Execution. Refer to the Required Configuration for Exposure section for more information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T13:15Z",
    "lastModifiedDate" : "2025-04-16T13:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1981",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ready-os.com/pl/",
          "name" : "https://ready-os.com/pl/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper neutralization of input provided by a low-privileged user into a file search functionality in Ready_'s Invoices module allows for SQL Injection attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T13:15Z",
    "lastModifiedDate" : "2025-04-16T13:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1982",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-552"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ready-os.com/pl/",
          "name" : "https://ready-os.com/pl/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Local File Inclusion vulnerability in Ready's attachment upload panel allows low privileged user to provide link to a local file using the file:// protocol thus allowing the attacker to read content of the file. This vulnerability can be use to read content of system files."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T13:15Z",
    "lastModifiedDate" : "2025-04-16T13:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1983",
        "ASSIGNER" : "cvd@cert.pl"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/en/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "name" : "https://cert.pl/posts/2025/04/CVE-2025-1980",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://ready-os.com/pl/",
          "name" : "https://ready-os.com/pl/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A cross-site scripting (XSS) vulnerability in Ready_'s File Explorer upload functionality allows injection of arbitrary JavaScript code in filename. Injected content is stored on server and is executed every time a user interacts with the uploaded file."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-16T13:15Z",
    "lastModifiedDate" : "2025-04-16T13:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1984",
        "ASSIGNER" : "cert@xerox.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://securitydocs.business.xerox.com/wp-content/uploads/2025/03/Xerox-Security-Bulletin-XRX25-006-for-Xerox-Desktop-Print-Experience.pdf",
          "name" : "https://securitydocs.business.xerox.com/wp-content/uploads/2025/03/Xerox-Security-Bulletin-XRX25-006-for-Xerox-Desktop-Print-Experience.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Xerox Desktop Print Experience application contains a Local Privilege Escalation (LPE) vulnerability, which allows a low-privileged user to gain SYSTEM-level access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-03-14T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1985",
        "ASSIGNER" : "info@cert.vde.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://cert.vde.com/en/advisories/VDE-2025-011",
          "name" : "https://cert.vde.com/en/advisories/VDE-2025-011",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Due to improper neutralization of input during web page generation (XSS) an unauthenticated remote attacker can inject HTML code into the Web-UI in the affected device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-26T09:15Z",
    "lastModifiedDate" : "2025-05-28T15:01Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1986",
        "ASSIGNER" : "contact@wpscan.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wpscan.com/vulnerability/f1414750-19ee-4a5d-b255-a9c20168b716/",
          "name" : "https://wpscan.com/vulnerability/f1414750-19ee-4a5d-b255-a9c20168b716/",
          "refsource" : "",
          "tags" : [ "Exploit", "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Gutentor  WordPress plugin before 3.4.7 does not sanitize and escape a parameter before using it in a SQL statement, allowing admins to perform SQL injection attacks"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:gutentor:gutentor:*:*:*:*:*:wordpress:*:*",
          "versionEndExcluding" : "3.4.7",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-01T06:15Z",
    "lastModifiedDate" : "2025-05-28T15:55Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1987",
        "ASSIGNER" : "cve-requests@bitdefender.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://bitdefender.com/support/support/security-advisories/stored-xss-in-psono-client-via-malicious-vault-entry-urls",
          "name" : "https://bitdefender.com/support/support/security-advisories/stored-xss-in-psono-client-via-malicious-vault-entry-urls",
          "refsource" : "",
          "tags" : [ "Broken Link", "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A Cross-Site Scripting (XSS) vulnerability has been identified in Psono-Client’s handling of vault entries of type website_password and bookmark, as used in Bitdefender SecurePass. The client does not properly sanitize the URL field in these entries. As a result, an attacker can craft a malicious vault entry (or trick a user into creating or importing one) with a javascript:URL. When the user interacts with this entry (for example, by clicking or opening it), the application will execute the malicious JavaScript in the context of the Psono vault. This allows an attacker to run arbitrary code in the victim’s browser, potentially giving them access to the user’s password vault and sensitive data."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:esaqa:psono_client:*:*:*:*:-:-:*:*",
          "versionEndIncluding" : "4.0.4",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitdefender:securepass:*:*:*:*:chrome:-:*:*",
          "versionEndExcluding" : "1.1.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitdefender:securepass:*:*:*:*:edge:-:*:*",
          "versionEndExcluding" : "1.1.18",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitdefender:securepass:*:*:*:*:firefox:-:*:*",
          "versionEndExcluding" : "1.1.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitdefender:securepass:*:*:*:*:safari:-:*:*",
          "versionEndExcluding" : "1.0.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:bitdefender:securepass:*:*:*:*:web_client:-:*:*",
          "versionEndExcluding" : "0.0.76",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-06-21T22:15Z",
    "lastModifiedDate" : "2025-07-30T18:59Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1990",
        "ASSIGNER" : "cve@gitlab.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-07-05T23:15Z",
    "lastModifiedDate" : "2025-07-05T23:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1991",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-191"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7238455",
          "name" : "https://www.ibm.com/support/pages/node/7238455",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Informix Dynamic Server 12.10,14.10, and15.0 could allow a remote attacker to cause a denial of service due to an integer underflow when processing packets."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:informix_dynamic_server:12.10:-:*:*:-:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:informix_dynamic_server:14.10:-:*:*:-:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:informix_dynamic_server:15.0:-:*:*:-:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-28T13:15Z",
    "lastModifiedDate" : "2025-08-14T01:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1992",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7232515",
          "name" : "https://www.ibm.com/support/pages/node/7232515",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM Db2 for Linux, UNIX and Windows (includes DB2 Connect Server) 11.5.0 through 11.5.9 and 12.1.0 through 12.1.1 could allow an authenticated user in federation environment, to cause a denial of service due to insufficient release of allocated memory after usage."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:db2:*:*:*:*:-:*:*:*",
            "versionStartIncluding" : "11.5.0",
            "versionEndIncluding" : "11.5.9",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:db2:12.1.0:*:*:*:-:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:ibm:db2:12.1.1:*:*:*:-:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:opengroup:unix:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-05T17:18Z",
    "lastModifiedDate" : "2025-08-20T02:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1993",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-521"
          }, {
            "lang" : "en",
            "value" : "CWE-521"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7233054",
          "name" : "https://www.ibm.com/support/pages/node/7233054",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM App Connect Enterprise Certified Container 8.1, 8.2, 9.0, 9.1, 9.2, 10.0, 10.1, 11.0, 11.1, 11.2, 11.3, 11.4, 11.5, 11.6, 12.0, 12.1, 12.2, 12.3, 12.4, 12.5, 12.6, 12.7, 12.8, 12.9, and 12.10 DesignerAuthoring instances store their flows in a database that is protected by weaker than expected cryptographic algorithms that could be decrypted by a local user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.5:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.7.0:r4:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.1.0:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.1:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.11.1:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.11.2:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_operator:*:*:*:*:continuous_delivery:*:*:*",
          "versionStartIncluding" : "8.1.0",
          "versionEndIncluding" : "11.6.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_operator:*:*:*:*:continuous_delivery:*:*:*",
          "versionStartIncluding" : "12.1.0",
          "versionEndIncluding" : "12.10.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_operator:*:*:*:*:lts:*:*:*",
          "versionStartIncluding" : "12.0.0",
          "versionEndIncluding" : "12.10.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.2:r2:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12:r1:*:*:lts:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12:r10:*:*:lts:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.4:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.3:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.2:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.0:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.11.3:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:12.0.12.0:r2:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.2:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.2.0:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.1.1:r1:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:app_connect_enterprise_certified_containers_operands:13.0.1.0:r2:*:*:continuous_delivery:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-09T18:16Z",
    "lastModifiedDate" : "2025-08-20T02:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1997",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-80"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7229035",
          "name" : "https://www.ibm.com/support/pages/node/7229035",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM UrbanCode Deploy (UCD) 7.0 through 7.0.5.25, 7.1 through 7.1.2.21, 7.2 through 7.2.3.14, and 7.3 through 7.3.2.0 / IBM DevOps Deploy 8.0 through 8.0.1.4 and 8.1 through 8.1 could allow unauthorized access to other services or potential exposure of sensitive data due to missing authentication in its Agent Relay service."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndExcluding" : "7.3.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0.0",
          "versionEndExcluding" : "7.0.5.26",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:devops_deploy:8.1.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.6,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.1,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-03-27T15:15Z",
    "lastModifiedDate" : "2025-08-14T19:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-1998",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7229034",
          "name" : "https://www.ibm.com/support/pages/node/7229034",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "IBM UrbanCode Deploy (UCD) through 7.1.2.21, 7.2 through 7.2.3.14, and 7.3 through 7.3.2.0 / IBM DevOps Deploy 8.0 through 8.0.1.4 and 8.1 through 8.1 \n\nstores potentially sensitive authentication token information in log files that could be read by a local user."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.1.0.0",
          "versionEndExcluding" : "7.1.2.22",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.2.0.0",
          "versionEndExcluding" : "7.2.3.15",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:urbancode_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.3.0.0",
          "versionEndExcluding" : "7.3.2.10",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:devops_deploy:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "8.0.0.0",
          "versionEndExcluding" : "8.0.1.5",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:devops_deploy:8.1.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-27T15:15Z",
    "lastModifiedDate" : "2025-08-14T19:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2000",
        "ASSIGNER" : "psirt@us.ibm.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.ibm.com/support/pages/node/7185949",
          "name" : "https://www.ibm.com/support/pages/node/7185949",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A maliciously crafted QPY file can potential execute arbitrary-code embedded in the payload without privilege escalation when deserialising QPY formats < 13. A python process calling Qiskit 0.18.0 through 1.4.1's `qiskit.qpy.load()` function could potentially execute any arbitrary Python code embedded in the correct place in the binary file as part of specially constructed payload."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ibm:qiskit:*:*:*:*:*:php:*:*",
          "versionStartIncluding" : "0.18.0",
          "versionEndExcluding" : "1.4.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-14T13:15Z",
    "lastModifiedDate" : "2025-08-18T18:19Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20001",
        "ASSIGNER" : "talos-cna@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
          "name" : "https://talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
          "name" : "https://www.talosintelligence.com/vulnerability_reports/TALOS-2025-2157",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An out-of-bounds read vulnerability exists in High-Logic FontCreator 15.0.0.3015. A specially crafted font file can trigger this vulnerability which can lead to disclosure of sensitive information. An attacker needs to trick the user into opening the malicious file to trigger this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-06-02T15:15Z",
    "lastModifiedDate" : "2025-06-02T17:32Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20002",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/GMOD/Apollo",
          "name" : "https://github.com/GMOD/Apollo",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-07",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-063-07",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "After attempting to upload a file that does not meet prerequisites, GMOD Apollo will respond with local path information disclosure"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T00:15Z",
    "lastModifiedDate" : "2025-03-05T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20003",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-59"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper link resolution before file access ('Link Following') for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20004",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-691"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01273.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01273.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient control flow management in the Alias Checking Trusted Module for some Intel(R) Xeon(R) 6 processor E-Cores firmware may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20006",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20008",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-277"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01297.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01297.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insecure inherited permissions for some Intel(R) Simics(R) Package Manager software before version 1.12.0 may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20009",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the UEFI firmware GenerationSetup module for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20011",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker case DOS through missing release of memory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-04T19:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20012",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-696"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01322.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect behavior order for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable information disclosure via physical access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20013",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20014",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "mySCADA myPRO does not properly neutralize POST requests sent to a specific port with version information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-29T20:15Z",
    "lastModifiedDate" : "2025-01-29T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20015",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01294.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01294.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path element for some Intel(R) Ethernet Connection software before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20016",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/vu/JVNVU99653331/",
          "name" : "https://jvn.jp/en/vu/JVNVU99653331/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/",
          "name" : "https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340/D440 provided by Y'S corporation. A user with an administrative privilege who logged in to the web management page of the affected product may execute an arbitrary OS command."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T10:15Z",
    "lastModifiedDate" : "2025-01-14T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20017",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) oneAPI Toolkit and component software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20018",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-822"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted pointer dereference for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2002",
        "ASSIGNER" : "cpcert@se.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-532"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-01.pdf",
          "name" : "https://download.schneider-electric.com/files?p_Doc_Ref=SEVD-2025-070-01&p_enDocType=Security+and+Safety+Notice&p_File_Name=SEVD-2025-070-01.pdf",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "CWE-532: Insertion of Sensitive Information into Log Files vulnerability exists that could cause the disclosure\nof FTP server credentials when the FTP server is deployed, and the device is placed in debug mode by an\nadministrative user and the debug files are exported from the device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-03-12T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20021",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-04T19:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20022",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-691"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient control flow management for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow a privileged user to potentially enable information disclosure via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20023",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01299.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions for some Intel(R) Graphics Driver software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20024",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-190"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through integer overflow. This vulnerability can be exploited only in restricted scenarios."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-04T19:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20025",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-674"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01326.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled recursion for some TinyCBOR libraries maintained by Intel(R) before version 0.6.1 may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20026",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20029",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000148587",
          "name" : "https://my.f5.com/manage/s/article/K000148587",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Command injection vulnerability exists in iControl REST and BIG-IP TMOS Shell (tmsh) save command, which may allow an authenticated attacker to execute arbitrary system commands.\n\n \n\n\nNote: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T18:15Z",
    "lastModifiedDate" : "2025-02-05T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2003",
        "ASSIGNER" : "security@devolutions.net"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-863"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://devolutions.net/security/advisories/DEVO-2025-0003/",
          "name" : "https://devolutions.net/security/advisories/DEVO-2025-0003/",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect authorization in PAM vaults in Devolutions Server 2024.3.12 and earlier allows an authenticated user to bypass the 'add in root' permission."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:devolutions:devolutions_server:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "2024.3.13.0",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-05T19:15Z",
    "lastModifiedDate" : "2025-03-28T16:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20030",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Exposure of sensitive information to an unauthorized actor for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable information disclosure via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20031",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20032",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow a privileged user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20033",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post types, which allows attackers to deny service to users with the sysconsole_read_plugins permission via creating a post with the custom_pl_notification type and specific props."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-09T07:15Z",
    "lastModifiedDate" : "2025-01-09T07:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20034",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper input validation in the BackupBiosUpdate UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards before version R01.02.0003 may allow a privileged user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20036",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Mobile Apps versions <=2.22.0 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T17:15Z",
    "lastModifiedDate" : "2025-01-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20037",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check time-of-use race condition in firmware for some Intel(R) Converged Security and Management Engine may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20039",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Race condition for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2004",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-73"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/simple-wp-events/trunk/admin/includes/wp-events-export-events.php#L399",
          "name" : "https://plugins.trac.wordpress.org/browser/simple-wp-events/trunk/admin/includes/wp-events-export-events.php#L399",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/abdca93e-f68d-4a96-8bd7-443ee46ccb5a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/abdca93e-f68d-4a96-8bd7-443ee46ccb5a?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Simple WP Events plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the wpe_delete_file AJAX action in all versions up to, and including, 1.8.17. This makes it possible for unauthenticated attackers to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.1,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-04-08T05:15Z",
    "lastModifiedDate" : "2025-04-08T05:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20041",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) Graphics software for Intel(R) Arc™ graphics and Intel(R) Iris(R) Xe graphics before version 32.0.101.6325/32.0.101.6252 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20042",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause information leak through out-of-bounds read."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-04T19:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20043",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20044",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-667"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01245.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01245.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper locking for some Intel(R) TDX Module firmware before version 1.5.13 may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T18:15Z",
    "lastModifiedDate" : "2025-08-12T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20045",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000138932",
          "name" : "https://my.f5.com/manage/s/article/K000138932",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When SIP session Application Level Gateway mode (ALG) profile with Passthru Mode enabled and SIP router ALG profile are configured on a Message Routing type virtual server, undisclosed traffic can cause the Traffic Management Microkernel (TMM) to terminate.  Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T18:15Z",
    "lastModifiedDate" : "2025-02-05T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20046",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20047",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-667"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01180.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01180.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper locking in the Intel(R) Integrated Connectivity I/O interface (CNVi) for some Intel(R) Core™ Ultra Processors may allow an unauthenticated user to potentially enable escalation of privilege via physical access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20048",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01266.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for the Intel(R) Trace Analyzer and Collector software all verions may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20049",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-058-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-058-01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.dariohealth.com/contact/",
          "name" : "https://www.dariohealth.com/contact/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Dario Health portal service application is vulnerable to XSS, which could allow an attacker to obtain sensitive information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T17:15Z",
    "lastModifiedDate" : "2025-02-28T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2005",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://wordpress.org/support/plugin/front-end-only-users/",
          "name" : "https://wordpress.org/support/plugin/front-end-only-users/",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/102223a1-07f5-485b-a6af-49cf316d9797?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/102223a1-07f5-485b-a6af-49cf316d9797?source=cve",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Front End Users plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the file uploads field of the registration form in all versions up to, and including, 3.2.32. This makes it possible for unauthenticated attackers to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:etoilewebdesign:front_end_users:*:*:*:*:*:wordpress:*:*",
          "versionEndIncluding" : "3.2.32",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 9.8,
          "baseSeverity" : "CRITICAL"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-02T10:15Z",
    "lastModifiedDate" : "2025-08-12T17:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20051",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 10.4.x <= 10.4.1, 9.11.x <= 9.11.7, 10.3.x <= 10.3.2, 10.2.x <= 10.2.2 fail to properly validate input when patching and duplicating a board, which allows a user to read any arbitrary file on the system via duplicating a specially crafted block in Boards."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.2.0",
          "versionEndExcluding" : "10.2.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.3.0",
          "versionEndExcluding" : "10.3.3",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "10.4.0",
          "versionEndExcluding" : "10.4.2",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:mattermost:mattermost_server:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "9.11.0",
          "versionEndExcluding" : "9.11.8",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-24T08:15Z",
    "lastModifiedDate" : "2025-08-18T18:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20052",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control for some Intel(R) Graphics software may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20053",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-119"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01313.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper buffer restrictions for some Intel(R) Xeon(R) Processor firmware with SGX enabled may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20054",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-248"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncaught exception in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20055",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/vu/JVNVU99653331/",
          "name" : "https://jvn.jp/en/vu/JVNVU99653331/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/",
          "name" : "https://stealthone.net/product_info/d220-d340%e3%80%8cv6-03-03%e3%80%8d%e5%8f%8a%e3%81%b3d440%e3%80%8cv7-00-11%e3%80%8d%e3%83%95%e3%82%a1%e3%83%bc%e3%83%a0%e3%82%a6%e3%82%a7%e3%82%a2%e3%82%92%e3%83%aa%e3%83%aa%e3%83%bc%e3%82%b9%e8%87%b4/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "OS command injection vulnerability exists in network storage servers STEALTHONE D220/D340 provided by Y'S corporation. An attacker who can access the affected product may execute an arbitrary OS command."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-14T10:15Z",
    "lastModifiedDate" : "2025-01-14T10:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20057",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20058",
        "ASSIGNER" : "f5sirt@f5.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://my.f5.com/manage/s/article/K000140947",
          "name" : "https://my.f5.com/manage/s/article/K000140947",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "When a BIG-IP message routing profile is configured on a virtual server, undisclosed traffic can cause an increase in memory resource utilization. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-05T18:15Z",
    "lastModifiedDate" : "2025-02-05T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20059",
        "ASSIGNER" : "responsible-disclosure@pingidentity.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://backstage.forgerock.com/knowledge/advisories/article/a61848355",
          "name" : "https://backstage.forgerock.com/knowledge/advisories/article/a61848355",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Relative Path Traversal vulnerability in Ping Identity PingAM Java Policy Agent allows Parameter Injection.This issue affects PingAM Java Policy Agent: through 5.10.3, through 2023.11.1, through 2024.9."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-20T15:15Z",
    "lastModifiedDate" : "2025-02-20T15:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2006",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/image-upload-for-bbpress/tags/1.1.19/bbp-image-upload.php#L136",
          "name" : "https://plugins.trac.wordpress.org/browser/image-upload-for-bbpress/tags/1.1.19/bbp-image-upload.php#L136",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3264738%40image-upload-for-bbpress&new=3264738%40image-upload-for-bbpress&sfp_email=&sfph_mail=",
          "name" : "https://plugins.trac.wordpress.org/changeset?sfp_email=&sfph_mail=&reponame=&old=3264738%40image-upload-for-bbpress&new=3264738%40image-upload-for-bbpress&sfp_email=&sfph_mail=",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/df09af41-399a-4878-8420-721f1198d895?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/df09af41-399a-4878-8420-721f1198d895?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Inline Image Upload for BBPress plugin for WordPress is vulnerable to arbitrary file uploads due to missing file extension validation in the file uploading functionality in all versions up to, and including, 1.1.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible. This may be exploitable by unauthenticated attackers when the \"Allow guest users without accounts to create topics and replies\" setting is enabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-29T07:15Z",
    "lastModifiedDate" : "2025-04-07T19:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20060",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-359"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-058-01",
          "name" : "https://www.cisa.gov/news-events/ics-medical-advisories/icsma-25-058-01",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.dariohealth.com/contact/",
          "name" : "https://www.dariohealth.com/contact/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "An attacker could expose cross-user personal identifiable information (PII) and personal health information transmitted to the Android device via the Dario Health application database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-28T17:15Z",
    "lastModifiedDate" : "2025-02-28T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20061",
        "ASSIGNER" : "ics-cert@hq.dhs.gov"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-01",
          "name" : "https://www.cisa.gov/news-events/ics-advisories/icsa-25-023-01",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "mySCADA myPRO does not properly neutralize POST requests sent to a specific port with email information. This vulnerability could be exploited by an attacker to execute arbitrary commands on the affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-29T20:15Z",
    "lastModifiedDate" : "2025-01-29T20:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20062",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01270.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Use after free for some Intel(R) PROSet/Wireless WiFi Software for Windows before version 23.100 may allow an unauthenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20063",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-06.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.3 and prior versions allow a local attacker cause apps crash through type confusion."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionEndIncluding" : "5.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.5,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-06-08T12:15Z",
    "lastModifiedDate" : "2025-06-09T19:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20067",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-208"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01280.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Observable timing discrepancy in firmware for some Intel(R) CSME and Intel(R) SPS may allow a privileged user to potentially enable information disclosure via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2007",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-23"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3261521/wp-ultimate-csv-importer/trunk/MediaHandling.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3261521/wp-ultimate-csv-importer/trunk/MediaHandling.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3923c732-80b5-4a04-80dd-b4d5b5e5567d?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3923c732-80b5-4a04-80dd-b4d5b5e5567d?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Import Export Suite for CSV and XML Datafeed plugin for WordPress is vulnerable to arbitrary file deletion due to insufficient file path validation in the deleteImage() function in all versions up to, and including, 7.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to delete arbitrary files on the server, which can easily lead to remote code execution when the right file is deleted (such as wp-config.php)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-04-01T05:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20071",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-476"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "NULL pointer dereference for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20072",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost Mobile versions <= 2.22.0 fail to properly validate the style of proto supplied to an action's style in post.props.attachments, which allows an attacker to crash the mobile via crafted malicious input."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-16T18:15Z",
    "lastModifiedDate" : "2025-01-16T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20074",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01286.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check Time-of-use race condition for some Intel(R) Connectivity Performance Suite software installers before version 40.24.11210 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20075",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-918"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/jp/JVN80527854/",
          "name" : "https://jvn.jp/en/jp/JVN80527854/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.info-brdg.co.jp/support/report/megane/sec20250201.html",
          "name" : "https://www.info-brdg.co.jp/support/report/megane/sec20250201.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Server-side request forgery (SSRF) vulnerability exists in FileMegane versions above 3.0.0.0 prior to 3.4.0.0. Executing arbitrary backend Web API requests could potentially lead to rebooting the services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-18T00:15Z",
    "lastModifiedDate" : "2025-02-18T00:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20076",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20077",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01300.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01300.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Missing release of memory after effective lifetime in the UEFI OobRasMmbiHandlerDriver module for some Intel(R) reference server platforms may allow a privileged user to enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20079",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01263.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01263.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Intel(R) Advisor software may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2008",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3261521/wp-ultimate-csv-importer/trunk/SingleImportExport.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3261521/wp-ultimate-csv-importer/trunk/SingleImportExport.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a114faf9-cada-4132-abe3-c0137b66e276?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/a114faf9-cada-4132-abe3-c0137b66e276?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Import Export Suite for CSV and XML Datafeed plugin for WordPress is vulnerable to arbitrary file uploads due to missing file type validation in the import_single_post_as_csv() function in all versions up to, and including, 7.19. This makes it possible for authenticated attackers, with Subscriber-level access and above, to upload arbitrary files on the affected site's server which may make remote code execution possible."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-04-01T05:15Z",
    "lastModifiedDate" : "2025-04-01T20:26Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20081",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "LOW",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 3.4
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-04T19:10Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20082",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-367"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01269.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Time-of-check time-of-use race condition in the UEFI firmware SmiVariable driver for the Intel(R) Server D50DNP and M50FCP boards may allow a privileged user to enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20083",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01290.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper authentication in the firmware for the Intel(R) Slim Bootloader may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20084",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01239.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled resource consumption for some Edge Orchestrator software for Intel(R) Tiber™ Edge Platform may allow an authenticated user to potentially enable denial of service via adjacent access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20086",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T17:15Z",
    "lastModifiedDate" : "2025-01-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20087",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01285.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect default permissions for some Intel(R) oneAPI DPC++/C++ Compiler software installers may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20088",
        "ASSIGNER" : "responsibledisclosure@mattermost.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://mattermost.com/security-updates",
          "name" : "https://mattermost.com/security-updates",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Mattermost versions 10.2.x <= 10.2.0, 9.11.x <= 9.11.5, 10.0.x <= 10.0.3, 10.1.x <= 10.1.3 fail to properly validate post props which allows a malicious authenticated user to cause a crash via a malicious post."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-15T17:15Z",
    "lastModifiedDate" : "2025-01-15T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2009",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/browser/newsletters-lite/trunk/views/admin/settings/view_logs.php?rev=3212300#L107",
          "name" : "https://plugins.trac.wordpress.org/browser/newsletters-lite/trunk/views/admin/settings/view_logs.php?rev=3212300#L107",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3257980/newsletters-lite/trunk/views/admin/settings/view_logs.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3257980/newsletters-lite/trunk/views/admin/settings/view_logs.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3825c80c-e4b1-4dd8-be77-38f718920b9a?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/3825c80c-e4b1-4dd8-be77-38f718920b9a?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Newsletters plugin for WordPress is vulnerable to Stored Cross-Site Scripting via the logging functionality in all versions up to, and including, 4.9.9.7 due to insufficient input sanitization and output escaping. This makes it possible for unauthenticated attackers to inject arbitrary web scripts in pages that will execute whenever a user accesses an injected page."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-03-26T09:15Z",
    "lastModifiedDate" : "2025-03-26T09:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20090",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-822"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01301.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01301.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Untrusted Pointer Dereference for some Intel(R) QuickAssist Technology software before version 2.5.0 may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20091",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-03.md",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker arbitrary code execution in pre-installed apps through use after free. This vulnerability can be exploited only in restricted scenarios."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:openatom:openharmony:*:*:*:*:-:*:*:*",
          "versionStartIncluding" : "4.1.0",
          "versionEndIncluding" : "5.0.2",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-04T04:15Z",
    "lastModifiedDate" : "2025-03-06T18:07Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20092",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01316.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path for some Clock Jitter Tool software before version 6.0.1 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20093",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-754"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01296.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper check for unusual or exceptional conditions in the Linux kernel-mode driver for some Intel(R) 800 Series Ethernet before version 1.17.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20094",
        "ASSIGNER" : "vultures@jpcert.or.jp"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-422"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://jvn.jp/en/jp/JVN66673020/",
          "name" : "https://jvn.jp/en/jp/JVN66673020/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.hummingheads.co.jp/dep/storelist/",
          "name" : "https://www.hummingheads.co.jp/dep/storelist/",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Unprotected Windows messaging channel ('Shatter') issue exists in Defense Platform Home Edition Ver.3.9.51.x and earlier. If an attacker sends a specially crafted message to the specific process of the Windows system where the product is running, arbitrary code may be executed with SYSTEM privilege."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-06T08:15Z",
    "lastModifiedDate" : "2025-02-06T08:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20095",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-276"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01305.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Incorrect Default Permissions for some Intel(R) RealSense™ SDK software before version 2.56.2 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20097",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-248"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-00990.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncaught exception in OpenBMC Firmware for the Intel(R) Server M50FCP Family and Intel(R) Server D50DNP Family before version R01.02.0002 may allow an authenticated user to potentially enable denial of service via network access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-12T22:15Z",
    "lastModifiedDate" : "2025-02-12T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20099",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01298.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01298.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control for some Intel(R) Rapid Storage Technology installation software may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2010",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-89"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://plugins.trac.wordpress.org/changeset/3271612/jobwp/tags/2.4.0/core/job_application.php?old=3230672&old_path=jobwp%2Ftags%2F2.3.9%2Fcore%2Fjob_application.php",
          "name" : "https://plugins.trac.wordpress.org/changeset/3271612/jobwp/tags/2.4.0/core/job_application.php?old=3230672&old_path=jobwp%2Ftags%2F2.3.9%2Fcore%2Fjob_application.php",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3b658f0-b9d8-4b7f-8d40-39ce185ef797?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/b3b658f0-b9d8-4b7f-8d40-39ce185ef797?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The JobWP – Job Board, Job Listing, Career Page and Recruitment Plugin plugin for WordPress is vulnerable to SQL Injection via the 'jobwp_upload_resume' parameter in all versions up to, and including, 2.3.9 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-19T03:15Z",
    "lastModifiedDate" : "2025-04-21T14:23Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20100",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01278.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01278.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper access control in the memory controller configurations for some Intel(R) Xeon(R) 6 processor with E-cores may allow a privileged user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20101",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01259.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Out-of-bounds read for some Intel(R) Graphics Drivers may allow an authenticated user to potentially enable information disclosure or denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20102",
        "ASSIGNER" : "scy@openharmony.io"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md",
          "name" : "https://gitee.com/openharmony/security/blob/master/zh/security-disclosure/2025/2025-04.md",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "in OpenHarmony v5.0.2 and prior versions allow a local attacker cause DOS through  out-of-bounds read."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-04-07T03:15Z",
    "lastModifiedDate" : "2025-04-07T03:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20103",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-410"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01244.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Insufficient resource pool in the core management mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable denial of service via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20104",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-362"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Race condition in some Administrative Tools for some Intel(R) Network Adapters package before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20108",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-427"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01293.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Uncontrolled search path element for some Intel(R) Network Adapter Driver installers for Windows 11 before version 29.4 may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-13T21:16Z",
    "lastModifiedDate" : "2025-05-13T21:16Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20109",
        "ASSIGNER" : "secure@intel.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-653"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html",
          "name" : "https://intel.com/content/www/us/en/security-center/advisory/intel-sa-01249.html",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Improper Isolation or Compartmentalization in the stream cache mechanism for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege via local access."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-12T17:15Z",
    "lastModifiedDate" : "2025-08-12T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2011",
        "ASSIGNER" : "cve-request@wordfence.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://github.com/datagoboom/CVE-2025-2011",
          "name" : "https://github.com/datagoboom/CVE-2025-2011",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/LeadsAjaxController.php?rev=3156664#L179",
          "name" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/LeadsAjaxController.php?rev=3156664#L179",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/LeadsAjaxController.php?rev=3156664#L23",
          "name" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/LeadsAjaxController.php?rev=3156664#L23",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/LeadsAjaxController.php?rev=3156664#L49",
          "name" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Controllers/Ajax/LeadsAjaxController.php?rev=3156664#L49",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Database/Repository/LeadRepository.php?rev=3156664#L224",
          "name" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Database/Repository/LeadRepository.php?rev=3156664#L224",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Services/LeadService.php?rev=3156664#L82",
          "name" : "https://plugins.trac.wordpress.org/browser/depicter/trunk/app/src/Services/LeadService.php?rev=3156664#L82",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://plugins.trac.wordpress.org/changeset/3287525/",
          "name" : "https://plugins.trac.wordpress.org/changeset/3287525/",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://wordpress.org/plugins/depicter/#description",
          "name" : "https://wordpress.org/plugins/depicter/#description",
          "refsource" : "",
          "tags" : [ ]
        }, {
          "url" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/49b36cde-39d8-4a69-8d7c-7b850b76a7cd?source=cve",
          "name" : "https://www.wordfence.com/threat-intel/vulnerabilities/id/49b36cde-39d8-4a69-8d7c-7b850b76a7cd?source=cve",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "The Slider & Popup Builder by Depicter plugin for WordPress is vulnerable to generic SQL Injection via the ‘s' parameter in all versions up to, and including, 3.6.1 due to insufficient escaping on the user supplied parameter and lack of sufficient preparation on the existing SQL query.  This makes it possible for unauthenticated attackers to append additional SQL queries into already existing queries that can be used to extract sensitive information from the database."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-05-06T10:15Z",
    "lastModifiedDate" : "2025-05-07T14:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20111",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1220"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n3kn9k-healthdos-eOqSWK4g",
          "name" : "cisco-sa-n3kn9k-healthdos-eOqSWK4g",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the health monitoring diagnostics of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the incorrect handling of specific Ethernet frames. An attacker could exploit this vulnerability by sending a sustained rate of crafted Ethernet frames to an affected device. A successful exploit could allow the attacker to cause the device to reload."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-02-26T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20112",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-268"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cucm-kkhZbHR5",
          "name" : "cisco-sa-cucm-kkhZbHR5",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in multiple Cisco Unified Communications and Contact Center Solutions products could allow an authenticated, local attacker to elevate privileges to root on an affected device.\r\n\r\nThis vulnerability is due to excessive permissions that have been assigned to system commands.&nbsp;An attacker could exploit this vulnerability by executing crafted commands on the underlying operating system. A successful exploit could allow the attacker to escape the restricted shell and gain root privileges on the underlying operating system of an affected device. To successfully exploit this vulnerability, an attacker would need administrative access to the ESXi hypervisor."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-05-21T17:15Z",
    "lastModifiedDate" : "2025-05-21T20:24Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20113",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-602"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4",
          "name" : "cisco-sa-cuis-priv-esc-3Pk96SU4",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in Cisco Unified Intelligence Center could allow an authenticated, remote attacker to elevate privileges to Administrator for a limited set of functions on an affected system.\r\n\r\nThis vulnerability is due to insufficient server-side validation of user-supplied parameters in API or HTTP requests. An attacker could exploit this vulnerability by submitting a crafted API or HTTP request to an affected system. A successful exploit could allow the attacker to access, modify, or delete data beyond the sphere of their intended access level, including obtaining potentially sensitive information stored in the system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:10.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.0\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.0\\(3\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.5\\(1\\)su:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\)_es05_et:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\)_et:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\)su1es10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\)su1es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su2es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es07:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es08:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es06:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es05:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:9.0\\(2\\)su3es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:8.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es05:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es06:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 7.1,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-05-21T17:15Z",
    "lastModifiedDate" : "2025-07-22T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20114",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-639"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cuis-priv-esc-3Pk96SU4",
          "name" : "cisco-sa-cuis-priv-esc-3Pk96SU4",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the API of Cisco Unified Intelligence Center could allow an authenticated, remote attacker to perform a horizontal privilege escalation attack on an affected system.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied parameters in API requests. An attacker could exploit this vulnerability by submitting crafted API requests to an affected system to execute an insecure direct object reference attack. A successful exploit could allow the attacker to access specific data that is associated with different users on the affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:10.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.0\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.0\\(3\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:11.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.5\\(1\\)su:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\)_es05_et:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(1\\)_et:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_intelligence_center:12.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\)su1es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\)su1es10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su2es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es05:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es06:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es07:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es08:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:8.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:9.0\\(2\\)su3es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es05:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es06:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-21T17:15Z",
    "lastModifiedDate" : "2025-07-22T14:41Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20115",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-120"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-bgp-dos-O7stePhX",
          "name" : "cisco-sa-iosxr-bgp-dos-O7stePhX",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in confederation implementation for the Border Gateway Protocol (BGP)&nbsp;in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to a memory corruption that occurs when a BGP update is created with an AS_CONFED_SEQUENCE attribute that has 255 autonomous system numbers (AS numbers). An attacker could exploit this vulnerability by sending a crafted BGP update message, or the network could be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more. A successful exploit could allow the attacker to cause memory corruption, which may cause the BGP process to restart, resulting in a DoS condition. To exploit this vulnerability, an attacker must control a BGP confederation speaker within the same autonomous system as the victim, or the network must be designed in such a manner that the AS_CONFED_SEQUENCE attribute grows to 255 AS numbers or more."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.27:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.52:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.90:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.35:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-08-01T16:13Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20116",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5",
          "name" : "cisco-sa-apic-multi-vulns-9ummtg5",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web UI of Cisco APIC could allow an authenticated, remote attacker to perform a stored XSS attack on an affected system. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to improper input validation in the web UI. An authenticated attacker could exploit this vulnerability by injecting malicious code into specific pages of the web UI. A successful exploit could allow the attacker to execute arbitrary script code in the context of the web UI or access sensitive, browser-based information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(6c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\(1f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(7e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-07-31T17:34Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20117",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-77"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5",
          "name" : "cisco-sa-apic-multi-vulns-9ummtg5",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the CLI of Cisco APIC could allow an authenticated, local attacker to execute arbitrary commands as root&nbsp;on the underlying operating system of an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(6c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\(1f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(7e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-07-31T17:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20118",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-212"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5",
          "name" : "cisco-sa-apic-multi-vulns-9ummtg5",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the implementation of the internal system processes of Cisco APIC could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to insufficient masking of sensitive information that is displayed through system CLI commands. An attacker could exploit this vulnerability by using reconnaissance techniques at the device CLI. A successful exploit could allow the attacker to access sensitive information on an affected device that could be used for additional attacks."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(6c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\(1f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(7e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-07-31T17:38Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20119",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-multi-vulns-9ummtg5",
          "name" : "cisco-sa-apic-multi-vulns-9ummtg5",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the system file permission handling of Cisco APIC could allow an authenticated, local attacker to overwrite critical system files, which could cause a DoS condition. To exploit this vulnerability, the attacker must have valid administrative credentials.\r\n\r\nThis vulnerability is due to a race condition with handling system files. An attacker could exploit this vulnerability by doing specific operations on the file system. A successful exploit could allow the attacker to overwrite system files, which could lead to the device being in an inconsistent state and cause a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(3o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(10g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2m\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(41d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(3c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(5f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(6i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.0\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:3.2\\(9h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2x\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(3q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.1\\(2w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(1l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.0\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(4p\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(5n\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(1h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.1\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(6o\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7l\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7q\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7r\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7s\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7t\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7u\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7v\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:4.2\\(7w\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(5e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(1j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(7g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(6h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(4h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(2j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(1d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(4c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.2\\(8i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(5j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(6c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.1\\(1f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(7e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:6.0\\(8d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:application_policy_infrastructure_controller:5.3\\(2e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 5.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.5,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-07-31T17:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2012",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-119/",
          "name" : "ZDI-25-119",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ashlar-Vellum Cobalt VS File Parsing Out-Of-Bounds Read Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VS files. The issue results from the lack of proper validation of user-supplied data, which can result in a read past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25185."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ashlar:cobalt:12.0.1204.91:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T21:15Z",
    "lastModifiedDate" : "2025-08-08T16:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20120",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnmpi-sxss-GSScPGY4",
          "name" : "cisco-sa-epnmpi-sxss-GSScPGY4",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Evolved Programmable Network Manager (EPNM) and Cisco Prime Infrastructure could allow an unauthenticated, remote attacker to conduct a stored cross-site scripting (XSS) attack against a user of the interface on an affected device.\r\n\r This vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.0.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.0.39:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.1.56:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.1:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.4:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.2:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.2:update04:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.3:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.3:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.3:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.3:update04:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.3:update05:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.3:update06:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:2.2.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2.0-fips:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3.0:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4.1:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4.1:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4.2:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.4:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.4:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.4:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4.2:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.0:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.0:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.0:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.1:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.1:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5.1:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.6.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.6.0:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.6.0:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.6.0:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.6.0:update04:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.0:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update04:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update05:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update06:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7.1:update07:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.0:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.0:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.1:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.1:update04:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.1:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8.1:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.0:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.1:update02:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.1:update03:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.1:update01:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9.1:update04:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack12:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack13:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack14:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack15:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack16:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.1:device_pack9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.2:device_pack4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3:device_pack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3:device_pack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.3:device_pack4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack10:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack11:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.4:device_pack9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5:device_pack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5:device_pack3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.5:device_pack4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.6:device_pack1*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.7:device_pack2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.8:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.9:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:prime_infrastructure:3.10:device_pack1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:1.2.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.0.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:2.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:3.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.1.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:4.0.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.0.2.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:5.1.4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.0.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1.1.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.0.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.0.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.0.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:6.1.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.1.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:evolved_programmable_network_manager:7.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-04-02T17:15Z",
    "lastModifiedDate" : "2025-08-06T15:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20122",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-300"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-priviesc-WCk7bmmt",
          "name" : "cisco-sa-sdwan-priviesc-WCk7bmmt",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the CLI of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, local attacker to gain privileges of the root user on the underlying operating system.\r\n\r\nThis vulnerability is due to insufficient input validation. An authenticated attacker with read-only privileges on the SD-WAN Manager system could exploit this vulnerability by sending a crafted request to the CLI of the SD-WAN Manager. A successful exploit could allow the attacker to gain root privileges on the underlying operating system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.45:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.46:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.401:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.13.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.14.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.15.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2_937:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.0.18.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.0.18.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.27:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.33:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.39:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.40:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.47:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.51:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.6.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1eft2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.24:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_925:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1_927:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_928:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_929:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1_930:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_937:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.17:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.813:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.814:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.24:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.0.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.38:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.41:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1eft2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.0.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.17:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.6.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-07-31T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20123",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "name" : "cisco-sa-xwork-xss-KCcg7WwU",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Multiple vulnerabilities in the web-based management interface of Cisco Crosswork Network Controller could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against users of the interface of an affected system.\r\n\r\nThese vulnerabilities exist because the web-based management interface does not properly validate user-supplied input. An attacker could exploit these vulnerabilities by inserting malicious data into specific data fields in the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit these vulnerabilities, the attacker must have valid administrative credentials.\r\nCisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.0.0",
          "versionEndExcluding" : "5.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.0.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 1.7,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-08T16:15Z",
    "lastModifiedDate" : "2025-07-23T15:39Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20124",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-502"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF",
          "name" : "cisco-sa-ise-multivuls-FTW9AOXF",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker to execute arbitrary commands as the root user on an affected device.\r\n\r\nThis vulnerability is due to insecure deserialization of user-supplied Java byte streams by the affected software. An attacker could exploit this vulnerability by sending a crafted serialized Java object to an affected API. A successful exploit could allow the attacker to execute arbitrary commands on the device and elevate privileges.\r\nNote:&nbsp;To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-05T17:15Z",
    "lastModifiedDate" : "2025-03-28T13:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20125",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-multivuls-FTW9AOXF",
          "name" : "cisco-sa-ise-multivuls-FTW9AOXF",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in an API of Cisco ISE could allow an authenticated, remote attacker with valid read-only credentials to obtain sensitive information, change node configurations, and restart the node.\r\n\r\nThis vulnerability is due to a lack of authorization in a specific API and improper validation of user-supplied data. An attacker could exploit this vulnerability by sending a crafted HTTP request to a specific API on the device. A successful exploit could allow the attacker to attacker to obtain information, modify system configuration, and reload the device.\r\nNote:&nbsp;To successfully exploit this vulnerability, the attacker must have valid read-only administrative credentials. In a single-node deployment, new devices will not be able to authenticate during the reload time."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-02-05T17:15Z",
    "lastModifiedDate" : "2025-03-28T13:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20126",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-thousandeyes-cert-pqtJUv9N",
          "name" : "cisco-sa-thousandeyes-cert-pqtJUv9N",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in certification validation routines of Cisco ThousandEyes Endpoint Agent for macOS and RoomOS could allow an unauthenticated, remote attacker to intercept or manipulate metrics information.\r\n\r\nThis vulnerability exists because the affected software does not properly validate certificates for hosted metrics services. An on-path attacker could exploit this vulnerability by intercepting network traffic using a crafted certificate. A successful exploit could allow the attacker to masquerade as a trusted host and monitor or change communications between the remote metrics service and the vulnerable client."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "1.206.3",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      }, {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:a:cisco:thousandeyes_endpoint_agent:*:*:*:*:*:*:*:*",
            "versionEndExcluding" : "1.207.2",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:o:cisco:roomos:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-01-08T16:15Z",
    "lastModifiedDate" : "2025-07-22T15:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20127",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-404"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3100_4200_tlsdos-2yNSCd54",
          "name" : "cisco-sa-3100_4200_tlsdos-2yNSCd54",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the TLS 1.3 implementation for a specific cipher for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software for Cisco Firepower 3100 and 4200 Series devices could allow an authenticated, remote attacker to consume resources that are associated with incoming TLS 1.3 connections, which eventually could cause the device to stop accepting any new SSL/TLS or VPN requests.\r\n\r\nThis vulnerability is due to the implementation of the TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. An attacker could exploit this vulnerability by sending a large number of TLS 1.3 connections with the specific TLS 1.3 Cipher TLS_CHACHA20_POLY1305_SHA256. A successful exploit could allow the attacker to cause a denial of service (DoS) condition where no new incoming encrypted connections are accepted. The device must be reloaded to clear this condition.\r\nNote: These incoming TLS 1.3 connections include both data traffic and user-management traffic. After the device is in the vulnerable state, no new encrypted connections can be accepted."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.7,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20128",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-122"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html",
          "name" : "ClamAV blog",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA",
          "name" : "cisco-sa-clamav-ole2-H549rphA",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Object Linking and Embedding 2 (OLE2) decryption routine of ClamAV could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to an integer underflow in a bounds check that allows for a heap buffer overflow read. An attacker could exploit this vulnerability by submitting a crafted file containing OLE2 content to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to terminate the ClamAV scanning process, resulting in a DoS condition on the affected software.\r\nFor a description of this vulnerability, see the .\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.0.0",
          "versionEndExcluding" : "1.0.8",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:clamav:clamav:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "1.1.0",
          "versionEndExcluding" : "1.4.2",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:linux:*:*",
          "versionEndExcluding" : "1.25.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:macos:*:*",
          "versionEndExcluding" : "1.24.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_endpoint_private_cloud:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "4.2.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*",
          "versionEndExcluding" : "7.5.20",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_endpoint:*:*:*:*:*:windows:*:*",
          "versionStartIncluding" : "8.0.1.21160",
          "versionEndExcluding" : "8.4.3",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-01-22T17:15Z",
    "lastModifiedDate" : "2025-08-06T14:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20129",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ccp-info-disc-ZyGerQpd",
          "name" : "cisco-sa-ccp-info-disc-ZyGerQpd",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based chat interface of Cisco Customer Collaboration Platform (CCP), formerly Cisco SocialMiner, could allow an unauthenticated, remote attacker to persuade users to disclose sensitive data.\r\n\r\nThis vulnerability is due to improper sanitization of HTTP requests that are sent to the web-based chat interface. An attacker could exploit this vulnerability by sending crafted HTTP requests to the chat interface of a targeted user on a vulnerable server. A successful exploit could allow the attacker to redirect chat traffic to a server that is under their control, resulting in sensitive information being redirected to the attacker."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:11.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:11.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:11.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:10.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:10.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.0\\(1\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:10.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.0\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:11.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:11.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.0\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.5\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:socialminer:12.5\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.5\\(1\\)su1es10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.0\\(1\\)su1es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su2es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:10.6\\(1\\)su3es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es07:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es08:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su01_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es06:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es05:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.0\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(2\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.6\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.5\\(1\\)su1es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:11.0\\(1\\)su1es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)su3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su02_es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)es01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:9.0\\(2\\)su3es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:8.5\\(1\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es04:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es05:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:unified_contact_center_express:12.5\\(1\\)_su03_es06:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "REQUIRED",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 2.5
      }
    },
    "publishedDate" : "2025-06-04T17:15Z",
    "lastModifiedDate" : "2025-08-01T15:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2013",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-416"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-120/",
          "name" : "ZDI-25-120",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ashlar-Vellum Cobalt CO File Parsing Use-After-Free Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of CO files. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25186."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ashlar:cobalt:12.0.1204.91:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T21:15Z",
    "lastModifiedDate" : "2025-08-15T20:37Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20130",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-434"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-file-upload-P4M8vwXY",
          "name" : "cisco-sa-ise-file-upload-P4M8vwXY",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the API of Cisco Identity Services Engine (ISE) and Cisco ISE Passive Identity Connector (ISE-PIC) could allow an authenticated, remote attacker with administrative privileges to upload files to an affected device.\r\n\r\nThis vulnerability is due to improper validation of the file copy function. An attacker could exploit this vulnerability by sending a crafted file upload request to a specific API endpoint. A successful exploit could allow the attacker to upload arbitrary files to an affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.2.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.1.0:patch9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.3.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.0",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.3.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.1.0",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch7:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch8:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.1.0:patch9:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:-:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:patch1:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:patch2:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:patch3:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:patch4:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:patch5:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine_passive_identity_connector:3.2.0:patch6:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.2,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 1.2,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-06-04T17:15Z",
    "lastModifiedDate" : "2025-07-22T15:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20133",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-vpn-dos-mfPekA6e",
          "name" : "cisco-sa-asaftd-vpn-dos-mfPekA6e",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the management and VPN web servers of the Remote Access SSL VPN feature of Cisco Secure Firewall ASA Software and Secure FTD Software could allow an unauthenticated, remote attacker to cause the device to unexpectedly stop responding, resulting in a DoS condition.\r\n\r\nThis vulnerability is due to ineffective validation of user-supplied input during the Remote Access SSL VPN authentication process. An attacker could exploit this vulnerability by sending a crafted request to the VPN service on an affected device. A successful exploit could allow the attacker to cause a DoS condition where the device stops responding to Remote Access SSL VPN authentication requests."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20134",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-ssltls-dos-eHw76vZe",
          "name" : "cisco-sa-asaftd-ssltls-dos-eHw76vZe",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the certificate processing of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper parsing of SSL/TLS certificates. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static Network Address Translation (NAT) rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : { },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-19T22:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20135",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-401"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-dhcp-qj7nGs4N",
          "name" : "cisco-sa-asaftd-dhcp-qj7nGs4N",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the DHCP client functionality of Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, adjacent attacker to exhaust available memory.\r\n\r\nThis vulnerability is due to improper validation of incoming DHCP packets. An attacker could exploit this vulnerability by repeatedly sending crafted DHCPv4 packets to an affected device. A successful exploit could allow the attacker to exhaust available memory, which would affect availability of services and prevent new processes from starting, resulting in a Denial of Service (DoS) condition that would require a manual reboot.\r\nNote: On Cisco Secure FTD Software, this vulnerability does not affect management interfaces."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "LOW",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20136",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-835"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
          "name" : "cisco-sa-asaftd-nat-dns-dos-bqhynHTM",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the function that performs IPv4 and IPv6 Network Address Translation (NAT) DNS inspection for Cisco Secure Firewall Adaptive Security Appliance (ASA) Software and Cisco Secure Firewall Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to cause the device to reload unexpectedly, resulting in a denial of service (DoS) condition.&nbsp;\r\n\r\nThis vulnerability is due to an infinite loop condition that occurs when a Cisco Secure ASA or Cisco Secure FTD device processes DNS packets with DNS inspection enabled and the device is configured for NAT44, NAT64, or NAT46. An attacker could exploit this vulnerability by sending crafted DNS packets that match a static NAT rule with DNS inspection enabled through an affected device. A successful exploit could allow the attacker to create an infinite loop and cause the device to reload, resulting in a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20137",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsgacl-pg6qfZk",
          "name" : "cisco-sa-ipsgacl-pg6qfZk",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the access control list (ACL) programming of Cisco IOS Software that is running on Cisco Catalyst 1000 Switches and Cisco Catalyst 2960L Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r This vulnerability is due to the use of both an IPv4 ACL and a dynamic ACL of IP Source Guard on the same interface, which is an unsupported configuration. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.\r\n\r Note: Cisco documentation has been updated to reflect that this is an unsupported configuration. However, Cisco is publishing this advisory because the device will not prevent an administrator from configuring both features on the same interface. There are no plans to implement the ability to configure both features on the same interface on Cisco Catalyst 1000 or Catalyst 2960L Switches."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(5b\\)e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(5c\\)e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(6\\)e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(6\\)e0c:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(6\\)e1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(6\\)e2b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(6\\)e3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e0s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e3k:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e8:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e9:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e10:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7\\)e12:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7a\\)e0b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(7b\\)e0b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(8\\)e6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-16fp-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-16p-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-16t-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-16t-e-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24fp-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24fp-4x-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24p-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24p-4x-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24pp-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24t-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-24t-4x-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48fp-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48fp-4x-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48p-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48p-4x-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48pp-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48t-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-48t-4x-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-8fp-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-8fp-e-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-8p-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-8p-e-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-8t-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000-8t-e-2g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000fe-24p-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000fe-24t-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000fe-48p-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_1000fe-48t-4g-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-24pq-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-24tq-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-48pq-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-48tq-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-08-05T14:08Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20138",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-priv-esc-GFQjxvOF",
          "name" : "cisco-sa-iosxr-priv-esc-GFQjxvOF",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of user arguments that are passed to specific CLI commands. An attacker with a low-privileged account could exploit this vulnerability by using crafted commands at the prompt. A successful exploit could allow the attacker to elevate privileges to root and execute arbitrary commands."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:x64:*",
          "versionEndExcluding" : "24.2.21",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:x64:*",
          "versionStartIncluding" : "24.3",
          "versionEndExcluding" : "24.4",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.8,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.0,
        "impactScore" : 6.0
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-07-31T18:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20139",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-185"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ece-dos-tC6m9GZ8",
          "name" : "cisco-sa-ece-dos-tC6m9GZ8",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in chat messaging features of Cisco Enterprise Chat and Email (ECE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper validation of user-supplied input to chat entry points. An attacker could exploit this vulnerability by sending malicious requests to a messaging chat entry point in the affected application. A successful exploit could allow the attacker to cause the application to stop responding, resulting in a DoS condition. The application may not recover on its own and may need an administrator to manually restart services to recover."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:enterprise_chat_and_email:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "12.6\\(1\\)es10",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-04-02T17:15Z",
    "lastModifiedDate" : "2025-08-06T20:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2014",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-457"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-115/",
          "name" : "ZDI-25-115",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ashlar-Vellum Cobalt VS File Parsing Use of Uninitialized Variable Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VS files. The issue results from the lack of proper initialization of memory prior to accessing it. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25235."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ashlar:cobalt:12.0.1204.91:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T21:15Z",
    "lastModifiedDate" : "2025-08-08T16:27Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20140",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-789"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-wlc-wncd-p6Gvt6HL",
          "name" : "cisco-sa-wlc-wncd-p6Gvt6HL",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Wireless Network Control daemon (wncd) of Cisco IOS XE Software for Wireless LAN Controllers (WLCs) could allow an unauthenticated, adjacent wireless attacker to cause a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper memory management. An attacker could exploit this vulnerability by sending a series of IPv6 network requests from an associated wireless IPv6 client to an affected device. To associate a client to a device, an attacker may first need to authenticate to the network, or associate freely in the case of a configured open network. A successful exploit could allow the attacker to cause the wncd process to consume available memory and eventually cause the device to stop responding, resulting in a DoS condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.4.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.4.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.5.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.5.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.5.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.5.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.4a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.5a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.8:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.9:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.6.10:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.7.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.7.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.7.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.7.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.7.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.7.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1c:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1d:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.1s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.8.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.1s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.5f:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.9.8:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1c:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1d:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1f:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1g:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.1s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.10.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1t:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1w:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1x:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1y:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1z1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1z2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.2a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.3a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.4a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.5a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.5b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.6a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.9:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.10:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.10a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.12:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1w:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1x:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1z:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.2a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.4b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.4c:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.5a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.5b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.2a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1w:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1x:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1z:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1z1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1w:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1x:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1x1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1y:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1y1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.10.1b:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_9800-cl_wireless_controllers_for_cloud:*:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9105axi:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9115axe:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9115axi:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9117axi:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9120axe:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9120axi:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9120axp:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9130axe:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9130axi:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9800-40:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9800-80:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_9800-l:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_cw9800h1:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_cw9800h2:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:catalyst_cw9800m:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-07-31T16:56Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20141",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-770"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Product" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr792-bWfVDPY",
          "name" : "cisco-sa-xr792-bWfVDPY",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms.&nbsp;\r\n\r\nThis vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5504:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a1-24h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a1-24q6h-s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a1-24q6h-ss:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a1-36h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a1-36h-se:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a1-48q6h:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a2-mod-hd-s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a2-mod-s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_55a2-mod-se-s:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57c3-mod-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57d2-18dd-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "ADJACENT_NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 7.4,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-08-06T17:05Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20142",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv4uni-LfM3cfBu",
          "name" : "cisco-sa-ipv4uni-LfM3cfBu",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the IPv4 access control list (ACL) feature and quality of service (QoS) policy feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the incorrect handling of malformed IPv4 packets that are received on line cards where the interface has either an IPv4 ACL or QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 packets through an affected device. A successful exploit could allow the attacker to cause network processor errors, resulting in a reset or shutdown of the network process. Traffic over that line card would be lost while the line card reloads.\r\nNote: This vulnerability has predominantly been observed in Layer 2 VPN (L2VPN) environments where an IPv4 ACL or QoS policy has been applied to the bridge virtual interface. Layer 3 configurations where the interface has either an IPv4 ACL or QoS policy applied are also affected, though the vulnerability has not been observed."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.23:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-08-01T18:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20143",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-347"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sb-lkm-zNErZjbZ",
          "name" : "cisco-sa-sb-lkm-zNErZjbZ",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker with high privileges to bypass the Secure Boot functionality and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device.\r\n\r\nThis vulnerability is due to insufficient verification of modules in the software load process. An attacker could exploit this vulnerability by manipulating the loaded binaries to bypass some of the integrity checks that are performed during the booting process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system.\r\nNote: This vulnerability affects Cisco IOS XR Software, not the Secure Boot feature.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "7.9.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 6.7,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.9
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-07-22T12:28Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20144",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ncs-hybridacl-crMZFfKQ",
          "name" : "cisco-sa-ncs-hybridacl-crMZFfKQ",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the hybrid access control list (ACL) processing of IPv4 packets in Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability is due to incorrect handling of packets when a specific configuration of the hybrid ACL exists. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass a configured ACL on the affected device.\r\nFor more information, see the  section of this advisory.\r\nCisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-12z20g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-12z20g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-24q2c2dd-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-24q8l2dd-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-24z8q2c-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-28z4c-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-28z4c-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-6z14s-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-6z18g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-6z18g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-acc-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-fh-agg:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540-fh-csr-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-12z16g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-12z16g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-16z4g8q2c-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-16z8q2c-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-4z14g2q-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-4z14g2q-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-6z18g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-6z18g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-8z16g-sys-a:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-8z16g-sys-d:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_540x-acc-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_560-4:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_560-7:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57b1-5dse-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57b1-6d24-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57c1-48q6-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57c3-mod-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_57d2-18dd-sys:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-08-04T12:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20145",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-264"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Technical Description" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-modular-ACL-u5MEPXMm",
          "name" : "cisco-sa-modular-ACL-u5MEPXMm",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the access control list (ACL) processing in the egress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL.\r\n\r\nThis vulnerability exists because certain packets are handled incorrectly when they are received on an ingress interface on one line card and destined out of an egress interface on another line card where the egress ACL is configured. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an egress ACL on the affected device.\r\nFor more information about this vulnerability, see the  section of this advisory.\r\nCisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.12:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.16:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.12:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.21:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.20:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.3.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.4.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:8608:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5504:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.8,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-08-04T12:03Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20146",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.apnic.net/2024/09/02/crafting-endless-as-paths-in-bgp/",
          "name" : "Crafting endless AS-PATHS in BGP",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-multicast-ERMrSvq7",
          "name" : "cisco-sa-multicast-ERMrSvq7",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Layer 3 multicast feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to the incorrect handling of malformed IPv4 multicast packets that are received on line cards where the interface has either an IPv4 access control list (ACL) or a QoS policy applied. An attacker could exploit this vulnerability by sending crafted IPv4 multicast packets through an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset. Traffic over that line card would be lost while the line card reloads."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "AND",
        "children" : [ {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.21:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.3.1:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : true,
            "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.3.2:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        }, {
          "operator" : "OR",
          "children" : [ ],
          "cpe_match" : [ {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          }, {
            "vulnerable" : false,
            "cpe23Uri" : "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*",
            "cpe_name" : [ ]
          } ]
        } ],
        "cpe_match" : [ ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-03-12T16:15Z",
    "lastModifiedDate" : "2025-08-01T18:50Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20147",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-79"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-vmanage-xss-xhN8M5jt",
          "name" : "cisco-sa-vmanage-xss-xhN8M5jt",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an authenticated, remote attacker to conduct a stored cross-site scripting attack (XSS) on an affected system.&nbsp;\r\n\r\nThis vulnerability is due to improper sanitization of user input to the web-based management interface. An attacker could exploit this vulnerability by submitting a malicious script through the interface. A successful exploit could allow the attacker to conduct a stored XSS attack on the affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.45:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.46:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2_937:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1_927:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.0.18.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.0.18.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.27:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.33:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.39:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.40:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.47:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.51:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.6.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1eft2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.24:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.401:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_925:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_928:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_929:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1_930:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_937:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.17:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.813:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.814:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.24:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.0.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.38:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.41:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1eft2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.0.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.17:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.6.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-07-31T18:14Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20148",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fmc-html-inj-MqjrZrny",
          "name" : "cisco-sa-fmc-html-inj-MqjrZrny",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Secure Firewall Management Center (FMC) Software could allow an authenticated, remote attacker to inject arbitrary HTML content into a device-generated document.\r\n\r\nThis vulnerability is due to improper validation of user-supplied data. An attacker could exploit this vulnerability by submitting malicious content to an affected device and using the device to generate a document that contains sensitive information. A successful exploit could allow the attacker to alter the standard layout of the device-generated documents, read arbitrary files from the underlying operating system, and conduct server-side request forgery (SSRF) attacks. To exploit this vulnerability, the attacker must have valid credentials for a user account with at least the role of Security Analyst (Read Only)."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.5,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.1,
        "impactScore" : 4.7
      }
    },
    "publishedDate" : "2025-08-14T17:15Z",
    "lastModifiedDate" : "2025-08-15T13:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2015",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-116/",
          "name" : "ZDI-25-116",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ashlar-Vellum Cobalt VS File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VS files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25236."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ashlar:cobalt:12.0.1204.91:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T21:15Z",
    "lastModifiedDate" : "2025-08-08T17:25Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20150",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-209"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nd-unenum-2xFFh472",
          "name" : "cisco-sa-nd-unenum-2xFFh472",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in Cisco Nexus Dashboard could allow an unauthenticated, remote attacker to enumerate LDAP user accounts.\r\n\r\nThis vulnerability is due to the improper handling of LDAP authentication requests. An attacker could exploit this vulnerability by sending authentication requests to an affected system. A successful exploit could allow an attacker to determine which usernames are valid LDAP user accounts."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.2\\(2f\\)",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-04-16T16:15Z",
    "lastModifiedDate" : "2025-08-07T00:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20151",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1284"
          }, {
            "lang" : "en",
            "value" : "CWE-16"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmpv3-qKEYvzsy",
          "name" : "cisco-sa-snmpv3-qKEYvzsy",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the implementation of the Simple Network Management Protocol Version 3 (SNMPv3) feature of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to poll an affected device using SNMP, even if the device is configured to deny SNMP traffic from an unauthorized source or the SNMPv3 username is removed from the configuration.\r\n\r\nThis vulnerability exists because of the way that the SNMPv3 configuration is stored in the Cisco IOS Software and Cisco IOS XE Software startup configuration. An attacker could exploit this vulnerability by polling an affected device from a source address that should have been denied. A successful exploit could allow the attacker to perform SNMP operations from a source that should be denied.\r\nNote: The attacker has no control of the SNMPv3 configuration. To exploit this vulnerability, the attacker must have valid SNMPv3 user credentials.\r\nFor more information, see the  section of this advisory."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.10.3b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1d:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1f:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.2r:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1c:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1b1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1d:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.1e:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe_sd-wan:16.12.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-08-05T14:33Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20152",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-125"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-restart-ss-uf986G2Q",
          "name" : "cisco-sa-ise-restart-ss-uf986G2Q",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the RADIUS message processing feature of Cisco Identity Services Engine (ISE) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r\nThis vulnerability is due to improper handling of certain RADIUS requests. An attacker could exploit this vulnerability by sending a specific authentication request to a network access device (NAD) that uses Cisco ISE for authentication, authorization, and accounting (AAA). A successful exploit could allow the attacker to cause Cisco ISE to reload."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:identity_services_engine:3.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-05-21T17:15Z",
    "lastModifiedDate" : "2025-07-11T15:22Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20153",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "NVD-CWE-noinfo"
          }, {
            "lang" : "en",
            "value" : "CWE-284"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-mailpol-bypass-5nVcJZMw",
          "name" : "cisco-sa-esa-mailpol-bypass-5nVcJZMw",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the email filtering mechanism of Cisco Secure Email Gateway could allow an unauthenticated, remote attacker to bypass the configured rules and allow emails that should have been denied to flow through an affected device. &nbsp;\r\n\r\nThis vulnerability is due to improper handling of email that passes through an affected device. An attacker could exploit this vulnerability by sending a crafted email through the affected device. A successful exploit could allow the attacker to bypass email filters on the affected device."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:13.0.0-392:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:13.0.5-007:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:13.5.1-277:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:13.5.4-038:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:14.0.0-698:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:14.2.0-620:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:14.2.1-020:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:14.3.0-032:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:15.0.0-104:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:15.0.1-030:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:15.0.3-002:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:15.5.0-048:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:15.5.1-055:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:15.5.2-018:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:secure_email_gateway:16.0.0-050:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.3,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 1.4
      }
    },
    "publishedDate" : "2025-02-19T16:15Z",
    "lastModifiedDate" : "2025-07-31T12:40Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20154",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-20"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-twamp-kV4FHugn",
          "name" : "cisco-sa-twamp-kV4FHugn",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Two-Way Active Measurement Protocol (TWAMP) server feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. For Cisco IOS XR Software, this vulnerability could cause the ipsla_ippm_server&nbsp;process to reload unexpectedly if debugs are enabled.\r\n\r\nThis vulnerability is due to out-of-bounds array access when processing specially crafted TWAMP control packets. An attacker could exploit this vulnerability by sending crafted TWAMP control packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.\r\nNote: For Cisco IOS XR Software, only the ipsla_ippm_server process reloads unexpectedly and only when debugs are enabled. The vulnerability details for Cisco IOS XR Software are as follows:&nbsp;&nbsp;&nbsp;&nbsp;Security Impact Rating (SIR): Low&nbsp;&nbsp;&nbsp;&nbsp;CVSS Base Score: 3.7&nbsp;&nbsp;&nbsp;&nbsp;CVSS Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L"
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*",
          "versionEndIncluding" : "15.9\\(3\\)m11",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "16.6.1",
          "versionEndIncluding" : "17.2.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.22:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.92:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.93:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.90:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.27:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.4.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.5.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.6.15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.11.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:24.2.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:6.5.35:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xr:7.8.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-07-31T16:44Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20155",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-1287"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bootstrap-KfgxYgdh",
          "name" : "cisco-sa-bootstrap-KfgxYgdh",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the bootstrap loading of Cisco IOS XE Software could allow an authenticated, local attacker to write arbitrary files to an affected system.\r\n\r This vulnerability is due to insufficient input validation of the bootstrap file that is read by the system software when a device is first deployed in SD-WAN mode or when an administrator configures SD-Routing on the device. An attacker could exploit this vulnerability by modifying a bootstrap file generated by Cisco Catalyst SD-WAN Manager, loading it into the device flash, and then either reloading the device in a green field deployment in SD-WAN mode or configuring the device with SD-Routing. A successful exploit could allow the attacker to perform arbitrary file writes to the underlying operating system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.11.99sw:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1y:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1w:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1x:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.6a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1z:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1z1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 6.0,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 5.2
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-07-31T15:12Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20156",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-274"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html",
          "name" : "ClamAV blog",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA",
          "name" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cmm-privesc-uy2Vf8pc",
          "name" : "cisco-sa-cmm-privesc-uy2Vf8pc",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the REST API of Cisco Meeting Management could allow a remote, authenticated attacker with low privileges to elevate privileges to administrator on an affected device.\r\n\r\nThis vulnerability exists because proper authorization is not enforced upon&nbsp;REST API users. An attacker could exploit this vulnerability by sending API requests to a specific endpoint. A successful exploit could allow the attacker to gain administrator-level control over edge nodes that are managed by Cisco Meeting Management."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:meeting_management:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.9.1",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T17:15Z",
    "lastModifiedDate" : "2025-08-01T15:52Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20157",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-295"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-catalyst-tls-PqnD5KEJ",
          "name" : "cisco-sa-catalyst-tls-PqnD5KEJ",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in certificate validation processing of Cisco Catalyst SD-WAN Manager, formerly Cisco SD-WAN vManage, could allow an unauthenticated, remote attacker to gain access to sensitive information.\r\n\r\nThis vulnerability is due to improper validation of certificates that are used by the Smart Licensing feature. An attacker with a privileged network position could exploit this vulnerability by intercepting traffic that is sent over the Internet. A successful exploit could allow the attacker to gain access to sensitive information, including credentials used by the device to connect to Cisco cloud services."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.097:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.929:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.099:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.302:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.303:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.3.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.1.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:17.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.2.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.45:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.46:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.2_937:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.1.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.098:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.2.4.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.4.501_es:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:18.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:19.0.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.0.18.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.0.18.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.27:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.33:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.39:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.40:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.47:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.51:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.6.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1eft2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.1.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.23:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.24:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.10.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.11.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.03:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.401:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.13.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.14.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.15.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_925:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1_927:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_928:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_929:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.1_930:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2_937:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.1.10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.17:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.2.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.0.18:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.813:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.814:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.24:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.5.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.25:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.3.4.0.26:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.1.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.1.0.02:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.4.2.2.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.0.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.5.1.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.4.0.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.31:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.32:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.38:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.3.0.41:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.5.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.6.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1eft2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.2.0.01:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.17:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.20:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.3.0.29:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.4.1.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.1.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.9.5.2.21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:catalyst_sd-wan_manager:20.12.4_monthly_es5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.9,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-08-04T14:46Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20158",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-200"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-phone-info-disc-YyxsWStK",
          "name" : "cisco-sa-phone-info-disc-YyxsWStK",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the debug shell of Cisco Video Phone 8875 and Cisco Desk Phone 9800 Series could allow an authenticated, local attacker to access sensitive information on an affected device. To exploit this vulnerability, the attacker must have valid administrative credentials with SSH access on the affected device. SSH access is disabled by default.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the debug shell of an affected device. An attacker could exploit this vulnerability by sending a crafted SSH client command to the CLI. A successful exploit could allow the attacker to access sensitive information on the underlying operating system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "NONE",
          "baseScore" : 4.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 3.6
      }
    },
    "publishedDate" : "2025-02-19T16:15Z",
    "lastModifiedDate" : "2025-02-19T16:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-2016",
        "ASSIGNER" : "zdi-disclosures@trendmicro.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-843"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://www.zerodayinitiative.com/advisories/ZDI-25-117/",
          "name" : "ZDI-25-117",
          "refsource" : "",
          "tags" : [ "Third Party Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "Ashlar-Vellum Cobalt VC6 File Parsing Type Confusion Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Ashlar-Vellum Cobalt. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.\n\nThe specific flaw exists within the parsing of VC6 files. The issue results from the lack of proper validation of user-supplied data, which can result in a type confusion condition. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25238."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:ashlar:cobalt:12.0.1204.91:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-03-11T21:15Z",
    "lastModifiedDate" : "2025-08-08T17:21Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20161",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-78"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ici-dpOjbWxk",
          "name" : "cisco-sa-nxos-ici-dpOjbWxk",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the software upgrade process of Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an authenticated, local attacker with valid Administrator credentials to execute a command injection attack on the underlying operating system of an affected device.\r\n\r\nThis vulnerability is due to insufficient validation of specific elements within a software image. An attacker could exploit this vulnerability by installing a crafted image. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with root privileges.&nbsp;\r\nNote: Administrators should validate the hash of any software image before installation."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N",
          "attackVector" : "LOCAL",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "HIGH",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.1,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 0.8,
        "impactScore" : 4.2
      }
    },
    "publishedDate" : "2025-02-26T17:15Z",
    "lastModifiedDate" : "2025-02-26T17:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20162",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-400"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-dhcpsn-dos-xBn8Mtks",
          "name" : "cisco-sa-iosxe-dhcpsn-dos-xBn8Mtks",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the DHCP snooping security feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a full interface queue wedge, which could result in a denial of service (DoS) condition.\r\n\r This vulnerability is due to improper handling of DHCP request packets. An attacker could exploit this vulnerability by sending DHCP request packets to an affected device. A successful exploit could allow the attacker to cause packets to wedge in the queue, creating a DoS condition for downstream devices of the affected system and requiring that the system restart to drain the queue.\r\n\r Note: This vulnerability can be exploited with either unicast or broadcast DHCP packets on a VLAN that does not have DHCP snooping enabled."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1c:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.11.1s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.2s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.1t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.3s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:16.12.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.1.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1r:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.1v:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.2.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.4.1b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.5.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.5.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.3.8a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.1y:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.3a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.6a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.5a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.6.8a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.7.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.10.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.10.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.8.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.8.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.3a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.11.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.11.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.3a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.12.4b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.13.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.13.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.14.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.14.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.15.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.15.1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5e:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios_xe:17.9.5f:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "NONE",
          "integrityImpact" : "NONE",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.6,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 3.9,
        "impactScore" : 4.0
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-07-11T14:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20163",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-322"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndfc-shkv-snQJtjrp",
          "name" : "cisco-sa-ndfc-shkv-snQJtjrp",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the SSH implementation of Cisco Nexus Dashboard Fabric Controller (NDFC) could allow an unauthenticated, remote attacker to impersonate Cisco NDFC-managed devices.\r\n\r\nThis vulnerability is due to insufficient SSH host key validation. An attacker could exploit this vulnerability by performing a machine-in-the-middle attack on SSH connections to Cisco NDFC-managed devices, which could allow an attacker to intercept this traffic. A successful exploit could allow the attacker to impersonate a managed device and capture user credentials."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:nexus_dashboard:*:*:*:*:*:*:*:*",
          "versionEndExcluding" : "3.2\\(2f\\)",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "HIGH",
          "privilegesRequired" : "NONE",
          "userInteraction" : "NONE",
          "scope" : "CHANGED",
          "confidentialityImpact" : "HIGH",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "NONE",
          "baseScore" : 8.7,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.2,
        "impactScore" : 5.8
      }
    },
    "publishedDate" : "2025-06-04T17:15Z",
    "lastModifiedDate" : "2025-07-22T16:58Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20164",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-862"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-http-privesc-wCRd5e3",
          "name" : "cisco-sa-ios-http-privesc-wCRd5e3",
          "refsource" : "",
          "tags" : [ ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the Cisco Industrial Ethernet Switch Device Manager (DM) of Cisco IOS Software could allow an authenticated, remote attacker to elevate privileges.\r\n\r This vulnerability is due to insufficient validation of authorizations for authenticated users. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to elevate privileges to privilege level 15.\r\n\r To exploit this vulnerability, the attacker must have valid credentials for a user account with privilege level 5 or higher. Read-only DM users are assigned privilege level 5."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "NONE",
          "scope" : "UNCHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "HIGH",
          "availabilityImpact" : "HIGH",
          "baseScore" : 8.3,
          "baseSeverity" : "HIGH"
        },
        "exploitabilityScore" : 2.8,
        "impactScore" : 5.5
      }
    },
    "publishedDate" : "2025-05-07T18:15Z",
    "lastModifiedDate" : "2025-05-07T18:15Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20165",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-789"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://blog.clamav.net/2025/01/clamav-142-and-108-security-patch.html",
          "name" : "ClamAV blog",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-bw-sip-dos-mSySbrmt",
          "name" : "cisco-sa-bw-sip-dos-mSySbrmt",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA",
          "name" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-clamav-ole2-H549rphA",
          "refsource" : "",
          "tags" : [ "Not Applicable" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the SIP processing subsystem of Cisco BroadWorks could allow an unauthenticated, remote attacker to halt the processing of incoming SIP requests, resulting in a denial of service (DoS) condition.\r\n\r\nThis vulnerability is due to improper memory handling for certain SIP requests. An attacker could exploit this vulnerability by sending a high number of SIP requests to an affected system. A successful exploit could allow the attacker to exhaust the memory that was allocated to the Cisco BroadWorks Network Servers that handle SIP traffic. If no memory is available, the Network Servers can no longer process incoming requests, resulting in a DoS condition that requires manual intervention to recover."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:broadworks_network_server:*:*:*:*:release_independent:*:*:*",
          "versionEndExcluding" : "2024.11",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : { },
    "publishedDate" : "2025-01-22T17:15Z",
    "lastModifiedDate" : "2025-08-06T20:02Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20166",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-86"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH",
          "name" : "cisco-sa-cspc-xss-CDOJZyH",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "name" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.0.0",
          "versionEndExcluding" : "5.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.0.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:30.1.1-0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-08T17:15Z",
    "lastModifiedDate" : "2025-07-23T15:47Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20167",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-86"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH",
          "name" : "cisco-sa-cspc-xss-CDOJZyH",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "name" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.0.0",
          "versionEndExcluding" : "5.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.0.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:30.1.1-0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-08T17:15Z",
    "lastModifiedDate" : "2025-07-23T16:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20168",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-86"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cspc-xss-CDOJZyH",
          "name" : "cisco-sa-cspc-xss-CDOJZyH",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        }, {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "name" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xwork-xss-KCcg7WwU",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the web-based management interface of Cisco Common Services Platform Collector (CSPC) could allow an authenticated, remote attacker to conduct cross-site scripting (XSS) attacks against a user of the interface.\r\n\r\nThis vulnerability is due to insufficient validation of user-supplied input by the web-based management interface of an affected system. An attacker could exploit this vulnerability by injecting malicious code into specific pages of the interface. A successful exploit could allow the attacker to execute arbitrary script code in the context of the affected interface or access sensitive, browser-based information. To exploit this vulnerability, the attacker must have at least a low-privileged account on an affected device.\r\nCisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "7.0.0",
          "versionEndExcluding" : "7.0.1",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "5.0.0",
          "versionEndExcluding" : "5.0.4",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:crosswork_network_controller:*:*:*:*:*:*:*:*",
          "versionStartIncluding" : "6.0.0",
          "versionEndExcluding" : "6.0.3",
          "cpe_name" : [ ]
        } ]
      }, {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:2.11.0.3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:a:cisco:common_services_platform_collector:30.1.1-0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        } ]
      } ]
    },
    "impact" : {
      "baseMetricV3" : {
        "cvssV3" : {
          "version" : "3.1",
          "vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
          "attackVector" : "NETWORK",
          "attackComplexity" : "LOW",
          "privilegesRequired" : "LOW",
          "userInteraction" : "REQUIRED",
          "scope" : "CHANGED",
          "confidentialityImpact" : "LOW",
          "integrityImpact" : "LOW",
          "availabilityImpact" : "NONE",
          "baseScore" : 5.4,
          "baseSeverity" : "MEDIUM"
        },
        "exploitabilityScore" : 2.3,
        "impactScore" : 2.7
      }
    },
    "publishedDate" : "2025-01-08T17:15Z",
    "lastModifiedDate" : "2025-07-23T16:11Z"
  }, {
    "cve" : {
      "data_type" : "CVE",
      "data_format" : "MITRE",
      "data_version" : "4.0",
      "CVE_data_meta" : {
        "ID" : "CVE-2025-20169",
        "ASSIGNER" : "psirt@cisco.com"
      },
      "problemtype" : {
        "problemtype_data" : [ {
          "description" : [ {
            "lang" : "en",
            "value" : "CWE-805"
          } ]
        } ]
      },
      "references" : {
        "reference_data" : [ {
          "url" : "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-dos-sdxnSUcW",
          "name" : "cisco-sa-snmp-dos-sdxnSUcW",
          "refsource" : "",
          "tags" : [ "Vendor Advisory" ]
        } ]
      },
      "description" : {
        "description_data" : [ {
          "lang" : "en",
          "value" : "A vulnerability in the SNMP subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an authenticated, remote attacker to cause a DoS condition on an affected device.\r\n\r\nThis vulnerability is due to improper error handling when parsing SNMP requests. An attacker could exploit this vulnerability by sending a crafted SNMP request to an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition.&nbsp;\r\nThis vulnerability affects SNMP versions 1, 2c, and 3. To exploit this vulnerability through SNMP v2c or earlier, the attacker must know a valid read-write or read-only SNMP community string for the affected system. To exploit this vulnerability through SNMP v3, the attacker must have valid SNMP user credentials for the affected system."
        } ]
      }
    },
    "configurations" : {
      "CVE_data_version" : "4.0",
      "nodes" : [ {
        "operator" : "OR",
        "children" : [ ],
        "cpe_match" : [ {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(3f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)xw6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)sb12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(2\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xa2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ixa:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(19c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(27\\)sv:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(7b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)jea1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(16\\)mr1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(10\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(23c\\)jy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(7c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(2\\)xa1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)ja2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(20\\)mrb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)bx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3g\\)jmb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)s4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(2\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)t5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(2\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(1\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)t9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)zu:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)fz:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(6i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yq:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)jl:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sra5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)xs:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xq2b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)so6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)yk1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xq:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)zy2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(1\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scj1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ixf1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)bw1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xf:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(35\\)se5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)s4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)s13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)e5b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)bc3a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)t9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)ey:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)s4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)xz2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xr5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xl5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)xd12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sra3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sec1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(6\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)xd7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scg3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)za7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zf:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(12a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(23\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(25\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)t10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)t7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)md:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)md8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)md:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)srb6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)src:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxh2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xq5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)srd5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scc5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12\\)da9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10\\)da3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10\\)da1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)s7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(6j\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1c:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)bc1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc1f:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xq1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxe6b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)tpc11b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb3x:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)sw:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)sw8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(9\\)xg4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(1\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(2\\)t3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnb2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jpc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)su2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(55\\)se2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)sv1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(23\\)sw1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xs2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)xu3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sre4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sre0a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(20\\)mrb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(35\\)ex:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(58\\)ex:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)ja1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(12b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(13b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(23b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(19\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(18c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)mr:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(19\\)mr2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(6\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)t8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(2\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)mra1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)sy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bz2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)t6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)t8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ixd1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)xv1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)srb3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)jl4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xr2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3\\)jl2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scd3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)b3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12\\)da:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12\\)da7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10\\)da6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10\\)da2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)s15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)xl1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(5d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(6a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(34\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(27b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(23a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(23c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(26c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)yh:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)bc1b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)xf1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)xd3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(9\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)zx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(9\\)xg3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(6\\)xt2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jaa:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jab:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scj2b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)su:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)se2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(27\\)sv4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29a\\)sv1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29\\)sv2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sw:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(21\\)sw1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb11a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)yf2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12b\\)m1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)ire2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)s5a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy7a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)sg4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)m7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(21\\)bc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(23\\)bc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(5\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(12\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(21\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(7f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(18a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(3\\)e2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jao2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(3\\)s1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(1\\)t3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)ea4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(3\\)m4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)cx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc1b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2e:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2l:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yt:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(19\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(13a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(3h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)t9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)md4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)jec2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)ste0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi8a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)irc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)mda2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)m8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12\\)da11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)s9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(16\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(21a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)t3e:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4d:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)t4e:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)tpc10a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb8a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sra2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(9\\)xg:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(6\\)xp:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(2\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)ec1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)sy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)xa1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xj:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xj1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)ew3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(46\\)se:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(55\\)se1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(44\\)se3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(55\\)se10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29\\)sv:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(27\\)sv2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29\\)sv1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)xx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)xy7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(1\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)t0a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(1\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(1\\)t5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sre9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)xo1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)mra:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(2\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(1\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(2\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)s6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(13a\\)bc6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(23\\)bc1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(23\\)bc9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sea:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(5b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(21a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)yu1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(2\\)mr:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(20\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)t8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)s5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)e3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(3\\)e4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(3\\)s4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jap4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jap5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(16\\)bx2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)cx1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)ja1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)ja4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2f:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)sz4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(9\\)yo4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yu:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yy2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(9\\)za:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)za2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(10d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(12d\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(17a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(3a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(9b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(26\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(24\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(18a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)t9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)t3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)t3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)t8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)t5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)t11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)cz3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)jea:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)md3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)md9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)xw4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)srb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29\\)svc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)jec3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)src5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(29\\)svd1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxh8a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxh7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxh8b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xy5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xl2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xm:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)xr2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)srd6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)sq3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scc4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scd1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)m4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)m6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)b5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10\\)da8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12\\)da4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)s8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)s13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)s11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)s5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)s6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)s9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)s15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)s19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)s5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)s13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xb5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(5c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(6g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(7\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(24\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12k\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(24a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(23f\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(23e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(46\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)ya4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)yc1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2i:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2f:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)dd2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xk1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(9\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)t6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)t16:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(20\\)t4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf10a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)sg5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(44\\)sg1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)fx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)sb2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)sb5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb19:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sb21:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sra:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)see:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)see4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)yz1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)sw2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)xj2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)xj4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(31\\)sga6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ixb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jap1n:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)ja10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(3\\)sn:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sqd3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(1\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jbb6a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnc1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scj2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)jnp:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(2\\)sp:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(3\\)m1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.6\\(3\\)m3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)xl:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ewa9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(14\\)su1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(46\\)se2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(44\\)se6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)sv:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sv3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17b\\)sxa2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxd6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xr7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)yg1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)m0:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)by1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)xa3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sre8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sre14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)mrb2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(1\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)s0a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)s6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)s4a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)s7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(10b\\)jde:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)ey:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(54\\)wo:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)s3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)m8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)se1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxj6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)mr:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)m4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)mdb5a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scg2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scg5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)scg6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)irh:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(1\\)sy4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(23\\)bc10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(21a\\)bc8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(21a\\)bc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)eu:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(44\\)ex1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(55\\)ex2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)seb3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ey:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(52\\)ey1c:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)ja4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)yq1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(12a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(18b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3h\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(19b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(18\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(53\\)ez:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(60\\)ez9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)jk2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)mr:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(16\\)mr:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(20\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)t12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(20\\)t3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)s3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jal1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(1\\)e2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)e6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb5h:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)jb6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(3\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(1\\)sy3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(2\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(1\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(2\\)t:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sci1a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)cx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)ja2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xu:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yj:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yw:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(3b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(3\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(3i\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(5a\\)b5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)t9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)t10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)t11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)zy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(22\\)md2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)md7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)jeb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxh2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xz:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)xl:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)srd7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sxi2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(52\\)xo:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3\\)jk1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(21a\\)jx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(24\\)mda9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)b7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)b2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(12\\)da10:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(9\\)s:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(20\\)s6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)s3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)xm2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(10\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(3g\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(6b\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13e\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(27a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(26\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(16c\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)bc1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bc2g:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)dd3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xh1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(2\\)t1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sxf9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sg3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(53\\)sg8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(27\\)sbc4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)jx6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(2\\)xb6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym12:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(14\\)ym11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(28\\)sb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb13:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb14:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sb15:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(4\\)xd8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(6\\)xe:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)sw6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(15\\)sw5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(11\\)sw3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(9\\)xg2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.7\\(3\\)m:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)xk1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(7\\)xi7:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)xe1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(4\\)xd2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)ew3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(50\\)se3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(54\\)se:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(18\\)sv3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(24\\)sv1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sv2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)sw4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(17d\\)sxb6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(8\\)xx2d:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)by1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(3g\\)jmc1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(1\\)sy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(1\\)sg1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)m2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sce2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)sg9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.0\\(2\\)ex11:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jax2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(2\\)sy1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(21a\\)bc4:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(9a\\)bc5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(21a\\)bc3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(25\\)ex1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(2\\)ja5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)ja:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.3\\(11\\)ja1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(16a\\):*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(1\\)s2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)sch2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.4\\(25e\\)jam6:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(5a\\)e1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.1\\(3\\)svb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.4\\(1\\)s1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)m5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.3\\(3\\)m8:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(3\\)s5:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.2\\(2\\)ea1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:15.5\\(3\\)m3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)bw2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)bw1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)bx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(16\\)bx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)bx1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)cx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(33\\)cy:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)dx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)dx3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)ja:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)ja2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb3:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1\\)mb1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb13c:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(4\\)mb9a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2g:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2a:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)mc2b:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)mc2c:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(15\\)mc2i:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yj1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(1a\\)xc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(2\\)xc2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)yl:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yx:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)yz2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(8\\)zb:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(11\\)zc:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zd2:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)ze:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zf1:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "cpe23Uri" : "cpe:2.3:o:cisco:ios:12.2\\(13\\)zh9:*:*:*:*:*:*:*",
          "cpe_name" : [ ]
        }, {
          "vulnerable" : true,
          "c